Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Using TPMs to Cryptographically Verify Devices at Scale

Linux Foundation via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how Google leverages Trusted Platform Modules (TPMs) to cryptographically verify devices at scale in this 40-minute conference talk by Matthew Garrett and Tom D'Netto. Delve into the challenges of maintaining device security once it leaves IT control and learn about TPMs' unique cryptographic identities. Discover how firmware and bootloaders utilize TPMs to generate verifiable logs of the entire boot process. Gain insights into Google's methods for building trust in a geographically diverse fleet of machines, establishing strong hardware-backed identities, and using remote attestation to prove sanctioned boot chains. Learn about newly-released cross-platform open-source libraries that enable others to build similar infrastructure. The talk covers topics such as the trust problem, TPM functionality, endorsement keys, association keys, and concludes with a Q&A session.

Syllabus

Introduction
Agenda
Trust Problem
What is a TPM
Purpose of a TPM
TPM functionality
TPM endorsement keys
Association keys
Overview
Open Source
Go
Questions

Taught by

Linux Foundation

Reviews

Start your review of Using TPMs to Cryptographically Verify Devices at Scale

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.