- What are, and how trusted are Trusted Platform Modules (TPMs)? How well are the implementations verified (by FLOSS, etc)? Are all platforms use secure? https://en.wikipedia.org/wiki/Trusted_Platform_Module 4 comments privacy
- Which brand new laptop is better in terms of freedom? http://en.wikipedia.org/wiki/Trusted_Platform_Module#Criticism 18 comments gnu
Linking pages
- Windows 11: TPMs and Digital Sovereignty | secret club https://secret.club/2021/06/28/windows11-tpms.html 278 comments
- In a first, researchers extract secret key used to encrypt Intel CPU code | Ars Technica https://arstechnica.com/?p=1717957 133 comments
- 5 years of Intel CPUs and chipsets have a concerning flaw that’s unfixable | Ars Technica https://arstechnica.com/information-technology/2020/03/5-years-of-intel-cpus-and-chipsets-have-a-concerning-flaw-thats-unfixable/ 75 comments
- マリウス . Reclaiming (Mobile) Privacy with GrapheneOS https://xn--gckvb8fzb.com/reclaiming-mobile-privacy-with-grapheneos/ 75 comments
- Go 1.20 Cryptography https://words.filippo.io/dispatches/go-1-20-cryptography/ 74 comments
- A Security Issue in Intel's Active Management Technology (AMT) - F-Secure Blog https://business.f-secure.com/intel-amt-security-issue 68 comments
- In a first, researchers extract secret key used to encrypt Intel CPU code | Ars Technica https://arstechnica.com/gadgets/2020/10/in-a-first-researchers-extract-secret-key-used-to-encrypt-intel-cpu-code/ 58 comments
- Exploiting Intel’s Management Engine – Part 1: Understanding PT’s TXE PoC (INTEL-SA-00086) | KaKaRoTo's Blog https://kakaroto.homelinux.net/2019/11/exploiting-intels-management-engine-part-1-understanding-pts-txe-poc/ 52 comments
- Introduction to Embedded Linux Security - part 1 - sergioprado.blog https://embeddedbits.org/introduction-embedded-linux-security-part-1/ 35 comments
- crepererum - Linux On Desktop In 2023 https://crepererum.net/linux-2023/ 29 comments
- Thunderspy: What it is, why it’s not scary, and what to do about it | Ars Technica https://arstechnica.com/information-technology/2020/05/thunderspy-what-is-is-why-its-not-scary-and-what-to-do-about-it/ 26 comments
- Upgrading my personal security, part two: disk encryption and secure boot - Aditya's Blog https://saligrama.io/blog/post/upgrading-personal-security-evil-maid/ 24 comments
- On non-technical video-games cheat mitigations https://dustri.org/b/on-non-technical-video-games-cheat-mitigations.html 21 comments
- Decrypt LUKS volumes with a TPM on Fedora 35+ · GitHub https://gist.github.com/jdoss/777e8b52c8d88eb87467935769c98a95 18 comments
- OpenSSL Privilege Separation Analysis - Red Hat Customer Portal https://securityblog.redhat.com/2014/07/02/its-all-a-question-of-time-aes-timing-attacks-on-openssl/ 16 comments
- Oops!... Google Did It Again - Dom's Bytes https://dombytes.com/post/oops-google-did-it-again/ 13 comments
- D-Installer needs your help | YaST https://yast.opensuse.org/blog/2022-12-05/d-installer-needs-you 12 comments
- Fingerprints as passwords: New iPhone Touch ID gets mixed security verdict (Updated) | Ars Technica http://arstechnica.com/security/2013/09/fingerprints-as-passwords-new-iphone-touch-id-gets-mixed-security-verdict/ 11 comments
- GitHub - gsauthof/dracut-sshd: Provide SSH access to initramfs early user space on Fedora and other systems that use Dracut https://github.com/gsauthof/dracut-sshd 10 comments
- In a first, researchers extract secret key used to encrypt Intel CPU code | Ars Technica https://arstechnica.com/gadgets/2020/10/in-a-first-researchers-extract-secret-key-used-to-encrypt-intel-cpu-code/?comments=1 8 comments
Related searches:
Search whole site: site:wikipedia.org
Search title: Trusted Platform Module - Wikipedia
See how to search.