YoVDO

Hacking With a TPM

Offered By: media.ccc.de via YouTube

Tags

Conference Talks Courses Disk Encryption Courses Trusted Platform Module Courses

Course Description

Overview

Explore the world of Trusted Platform Modules (TPMs) in this 38-minute conference talk from the 36C3 event. Discover how TPMs, now included in all consumer-grade devices, can enhance security for everyday users. Learn about OpenSource software and practical use cases supported by TPMs, including securing personal and system credentials, encrypting storage, and detecting BIOS manipulations. Gain insights into debunking TPM myths and understand how to leverage these built-in security features for improved protection of your digital assets. Delve into topics such as PKCS11 integration, OpenSSL authentication, LUKS encryption, and BIOS integrity checks. Join speaker Andreas Fuchs as he demonstrates the potential of TPMs and encourages participation in OpenSource efforts to expand their capabilities.

Syllabus

Introduction
Disclosure
What is a TPM
TPM Reputation
Credential Protection
Demo
BitLocker for Linux
Crypt Setup
Integrity Check
Preparation
Results
Question time
Questions


Taught by

media.ccc.de

Related Courses

TPM-FAIL - TPM Meetings Timing and Lattice Attacks
TheIACR via YouTube
Look at ME! - Intel ME Investigation
media.ccc.de via YouTube
What Is Needed to Build Trusted Infrastructures
Red Hat via YouTube
Keylime - An Open Source TPM Project for Remote Trust
Linux Foundation via YouTube
Using TPMs to Cryptographically Verify Devices at Scale
Linux Foundation via YouTube