tpm.dev.tutorials

Tutorials from TPM.dev members (by tpm2dev)

Tpm.dev.tutorials Alternatives

Similar projects and alternatives to tpm.dev.tutorials

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a better tpm.dev.tutorials alternative or higher similarity.

tpm.dev.tutorials reviews and mentions

Posts with mentions or reviews of tpm.dev.tutorials. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-08-24.
  • Bypassing Bitlocker using a cheap logic analyzer on a Lenovo laptop
    3 projects | news.ycombinator.com | 24 Aug 2023
    >> The discrete TPM's threat model was never designed to cover you from attackers using oscilloscope to probe your laptop's SPI bus during the boot process for unencrypted data.

    This is not really true. All TPMs (or at least since v2.0, but no matter if discrete or not) support encrypted session against passive eavesdroppers. There is also the possibility to protect against MiTM attacks, but that is more complex (since you then need to setup credentials).

    See here [0]:

    "Encryption sessions are useful for when the path to a TPM is not trused, such as when a TPM is a remote TPM, or when otherwise the path to the TPM is not trusted."

    The issue is that the OS / Bootloader does not implement such mechanism.

    [0] https://github.com/tpm2dev/tpm.dev.tutorials/blob/master/Int...

  • AMD's Firmware TPMs Vulnerable to Hardware Attacks, Defeating Disk Encryption
    3 projects | news.ycombinator.com | 2 May 2023
    > A dTPM uses an unencrypted protocol to communicate with the CPU

    While that is strictly speaking true, the TPM command set allows you to set up an encrypted session to the TPM using an ECDH or RSA key for key exchange that authenticates the TPM.

    The problem is that the BMCs and BIOSes out there don't record a public key for a primary key on the TPM and then don't bother using encrypted sessions (not even opportunistically getting that public key from the TPM, which would defeat passive attacks).

    That's a software problem, not a TPM problem!

    I know that TPM 2.0 is a huge topic, so it's quite forgivable that people don't know these things. I've written a tutorial that might help: https://github.com/tpm2dev/tpm.dev.tutorials/tree/master/Int...

  • The Trusted Platform Module Key Hierarchy
    1 project | news.ycombinator.com | 4 Dec 2022
    https://github.com/tpm2dev/tpm.dev.tutorials/tree/master/Int...

    I have learned a fair bit since I wrote it, so I should probably edit it.

  • A note from our sponsor - InfluxDB
    www.influxdata.com | 3 May 2024
    Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →

Stats

Basic tpm.dev.tutorials repo stats
3
80
10.0
about 2 years ago

tpm2dev/tpm.dev.tutorials is an open source project licensed under Creative Commons Attribution Share Alike 4.0 which is not an OSI approved license.

The primary programming language of tpm.dev.tutorials is Shell.


Sponsored
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com