CHAPTER 22
Platform Security Technologies That Use TPM 2.0
Okay, we’ve written a whole book on TPMs, and you’ve apparently read the whole thing. Perhaps our attempts to keep the book interesting were successful. . .or you’re extraordinarily persistent. . .or maybe you just cheated and skipped to the conclusion.
Either way, we’ve reached the end of the matter. TPMs are great and awesome, the security equivalent of sliced bread, no doubt about it. And TPMs by themselves offer a good level of security. For instance, an application like Microsoft’s BitLocker can use a TPM to securely store a hard disk encryption key and control access to the key. ...
Get A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security Will Arthur & David Challener now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.