linux.conf.au
TPM Based Attestation - How Can We Use It for Good?
Explore TPM-based attestation for network security, SSH host key trust, and system recovery. Learn about TPM functionality, event logs, and open-source solutions for user protection without compromising privacy.