Trusting Your Raspberry Pi - An Introduction to the TPM and IoT

Trusting Your Raspberry Pi - An Introduction to the TPM and IoT

code::dive conference via YouTube Direct link

TPM structure

24 of 34

24 of 34

TPM structure

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Trusting Your Raspberry Pi - An Introduction to the TPM and IoT

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 The Raspberry Pi
  3. 3 How does it boot up
  4. 4 The TPM device driver
  5. 5 Random number generator
  6. 6 Whats inside
  7. 7 Hierarchies
  8. 8 Taking ownership of the TPM
  9. 9 Generating keys
  10. 10 Generating an RSA key
  11. 11 Generating an AS key
  12. 12 Load external keys
  13. 13 Exercise to redux
  14. 14 Encryption
  15. 15 NVRAM
  16. 16 NVRAM area
  17. 17 Measured boot
  18. 18 Default usages
  19. 19 TCG
  20. 20 We faked it
  21. 21 How we faked it
  22. 22 Raspberry Pi
  23. 23 Quote
  24. 24 TPM structure
  25. 25 Remote attestation
  26. 26 Rebooting
  27. 27 How it works
  28. 28 Define NVRAM area
  29. 29 Read from NVRAM area
  30. 30 Evil made attack
  31. 31 Changing the PCR
  32. 32 Backing up data
  33. 33 Open SSL
  34. 34 Safety Critical Systems

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.