Trustworthy Shield – A Cheap TPM Module for Older Systems
Hack In The Box Security Conference via YouTube
Overview
Explore the concept of Trustworthy Shield, a cost-effective TPM module designed for older computer systems, in this 19-minute conference talk from the Hack In The Box Security Conference. Delve into the world of trusted computing as an active defense technology that can automatically protect against new security threats without relying on virus database updates. Learn how this innovative solution addresses the security challenges faced by older systems running legacy industry software on unsupported operating systems. Discover the features and components of Trustworthy Shield, including its chips, trusted computing platform, and policy management capabilities. Gain insights into the potential applications of this technology in IoT device management and trusted applications. Understand the history and technology behind trusted computing, and explore how this affordable solution can enhance security for older hardware without requiring significant modifications.
Syllabus
Introduction
Who am I
History of Trusted Computing
Technology of Trusted Computing
Trustworthy Shield
Chips
Features
Trusted Computing Platform
Trusted Server
Policy Management
IoT Devices Management
Trusted Application
Conclusion
Taught by
Hack In The Box Security Conference