Navigation
Recherche
|
[$] Secure key handling using the TPM
mercredi 17 octobre 2018, 18:36 , par LWN.net
Trusted Computing has not had the best
reputation over the years — Richard Stallman dubbing it 'Treacherous Computing' probably hasn't helped — though those fears of taking away users' control of their computers have not proven to be founded, at least yet. But the Trusted Platform Module, or TPM, inside your computer can do more than just potentially enable lockdown. In our second report from Kernel Recipes 2018, we look at a talk from James Bottomley about how the TPM works, how to talk to it, and how he's using it to improve his key handling.
https://lwn.net/Articles/768419/rss
|
56 sources (32 en français)
Date Actuelle
jeu. 21 nov. - 17:33 CET
|