Главная
Study mode:
on
1
Introduction
2
Disclosure
3
What is a TPM
4
TPM Reputation
5
Credential Protection
6
Demo
7
BitLocker for Linux
8
Crypt Setup
9
Integrity Check
10
Preparation
11
Results
12
Question time
13
Questions
Description:
Explore the world of Trusted Platform Modules (TPMs) in this 38-minute conference talk from the 36C3 event. Discover how TPMs, now included in all consumer-grade devices, can enhance security for everyday users. Learn about OpenSource software and practical use cases supported by TPMs, including securing personal and system credentials, encrypting storage, and detecting BIOS manipulations. Gain insights into debunking TPM myths and understand how to leverage these built-in security features for improved protection of your digital assets. Delve into topics such as PKCS11 integration, OpenSSL authentication, LUKS encryption, and BIOS integrity checks. Join speaker Andreas Fuchs as he demonstrates the potential of TPMs and encourages participation in OpenSource efforts to expand their capabilities.

Hacking With a TPM

media.ccc.de
Add to list
0:00 / 0:00