Skip to content

Use trusted compute module for device authentication if present #105

@markope

Description

@markope

Use the TPM module of a device if present to verify the identity of the device and also to encrypt/decrypt with the TPM generated keys.

This prevents physical attacks on a device to use it as a vehicle for broader access to the system.

If this happens then if the hardware is going to be switched but retaining the same device config, then there needs to be a method to replace the key in the system.

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions