blog post explaining the concepts of a TPM and how you can use them on Linux for full disk encryption. Also explains common pitfalls and attacks on TPMs.
No pages have linked to this URL yet.
Log in or sign up to submit feeds.