Almost all our laptops, and many servers, feature a TPM today. The TPM doesn't have the best reputation in the community because it could be used to lock down platforms or do nasty things with DRM. Under normal conditions on PCs, the TPM is controlled by the system owner and could actually be useful for almost anything involving crypto. Unfortunately the integration of the TPM in the OS is essentially non-existent. The introduction of the TPM2.0 standard complicates matters, because we now have two different devices with different APIs.

The goal of this project would be to identify reasonable use cases for the TPM, evaluate exisiting projects, and create ways how to integrate it into various workflows in openSUSE.

Looking for hackers with the skills:

cryptography security

This project is part of:

Hack Week 15

Activity

  • almost 7 years ago: randybb liked this project.
  • almost 7 years ago: hennevogel liked this project.
  • almost 7 years ago: mwilck liked this project.
  • almost 7 years ago: mwilck added keyword "cryptography" to this project.
  • almost 7 years ago: mwilck added keyword "security" to this project.
  • almost 7 years ago: mwilck originated this project.

  • Comments

    Be the first to comment!

    Similar Projects

    Authenticated hashes for BTRFS by dsterba

    Project Description

    Implement a checksum ...


    Port NeuVector zero-trust security functions to host/VM by feih

    Project Description

    Today, NeuVector on...


    Model checking the BPF verifier by shunghsiyu

    Project Description

    BPF verifier plays a ...


    Predefined app security policy template for NeuVector by feih

    Project Description

    Idea is to predefin...