Skip to content

Use trusted compute module for device authentication if present #105

@markope

Description

@markope

Use the TPM module of a device if present to verify the identity of the device and also to encrypt/decrypt with the TPM generated keys.

This prevents physical attacks on a device to use it as a vehicle for broader access to the system.

If this happens then if the hardware is going to be switched but retaining the same device config, then there needs to be a method to replace the key in the system.

Metadata

Metadata

Assignees

Type

No type
No fields configured for issues without a type.

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions