TPM and Trusted Computing

This cluster centers on discussions about Trusted Platform Module (TPM) chips, their use in secure boot, remote attestation, and hardware security, debating whether they provide genuine user benefits or mainly enable DRM and vendor control. Related topics include software vs hardware TPMs, comparisons to TrustZone or SGX, and concerns over treacherous computing.

📉 Falling 0.5x Security
4,954
Comments
19
Years Active
5
Top Authors
#3680
Topic ID

Activity Over Time

2008
8
2009
26
2010
9
2011
23
2012
28
2013
131
2014
91
2015
141
2016
247
2017
257
2018
221
2019
207
2020
299
2021
614
2022
555
2023
887
2024
493
2025
585
2026
134

Keywords

TrustZone COM PHP ARM AWS GPIO SSH habets.se AMD TEE tpm attestation secure remote hardware keys chips secure boot enclave key

Sample Comments

wiz21c Jul 25, 2023 View on HN

Does this relate to the TPM chips ?https://en.wikipedia.org/wiki/Trusted_Platform_Module

ericpauley Mar 19, 2023 View on HN

Using a TPM: https://en.wikipedia.org/wiki/Trusted_Platform_Module

Akronymus Aug 31, 2022 View on HN

Probably missing the TPM.https://en.wikipedia.org/wiki/Trusted_Platform_Module

RobotToaster Feb 19, 2023 View on HN

Why couldn't they just use a software TPM?

voldacar Nov 28, 2022 View on HN

secure boot with keys outside your control, mandatory TPM chips, remote attestation, etc

novaleaf Nov 3, 2016 View on HN

i would imagine as some sort of secure-boot or trusted hardware process.

fsflover Jun 6, 2023 View on HN

My laptop can use TPM and a hardware key with my keys and free software. Where is the degraded security?

SpikeGronim Dec 8, 2010 View on HN

Agreed, finally a use for TPM that isn't customer hostile.

nicce Oct 26, 2022 View on HN

Well, luckily we have TPM chip just for that...

trympet May 8, 2023 View on HN

This is false. Here are technical docs on how the TPM is used: https://learn.microsoft.com/en-us/windows/security/informati...