![]() What it does not do- Protect your system or data. Remote attestation*– Device fingerprinting and recognition.ĭigital Rights Management– Ensures all media, software, etc. When TPM is used, the firmware and the operating system are responsible for ensuring integrity.” Functions-Įncryption– random number generator plus cryptographic capabilities. ![]() This is to ensure that the boot process starts from a trusted combination of hardware and software, and continues until the operating system has fully booted and applications are running. In this context, “integrity” means “behave as intended”, and a “platform” is any computer device regardless of its operating system. Why was the TPM created?įrom Wikipedia– “The primary scope of TPM is to ensure the integrity of a platform. There is a good amount of info to cover about what that means, but for today we will just be discussing what, in a perfect world, the TPM 2.0 was intended to be. The TCG board is made up of technology manufacturer executives and sadly, has no one from the EFF ( Electronic Frontiers Foundation) or any similar consumer advocacy organization, which means caveat emptor as usual. Beyond that, it depends on who you ask.įor the basics, the TPM (Trusted Platform Module) development has been governed by the TCG (Trusted Computing Group) which is a non-profit (quite lucrative Think Tank) offspring (spawn) of the IT industry (Big Tech). ![]() What is it exactly? Fundamentally, it is a platform integrity and security device. ![]() With the roll out of Windows 11, the term TPM 2.0 has been introduced to the general public. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |