Unlocking Security: The Truth About HW Root of Trust with Russell Doty & Javier Martinez Canillas 🔒
Discover how hardware roots of trust like TPM 2.0 form the foundation of secure systems. Experts Russell Doty and Javier Martinez Canillas reveal what you need to know to trust your hardware this time!

DevConf
241 views • Jan 26, 2018

About this video
Secure systems are built on a layered model. You ultimately have to trust something - but what? TPM 2.0 is a Hardware RoT (Root of Trust), including the TPM 2.0 module, the TCG Software Stack (TSS), operations it can perform, and userspace tools that simplify using TPM 2.0. We also cover the TPM 2.0 Resource Manager, a new feature that is critical to enabling multiple users and applications to use the TPM. In addition we will go over the implementation of TPM in Fedora and RHEL. We will demo TPM using Clevis to automatically unlock an encrypted root volume on boot with the master key secured by TPM. Beyond Clevis we will explore other uses of TPM 2.0 including Trusted Boot, secure systems identity, protected keyring, and protected certificates.
Video Information
Views
241
Likes
2
Duration
24:01
Published
Jan 26, 2018
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.