AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Trusted Platform Module (TPM) Security and Physical Attacks
This chapter explores the role of TPM in security, focusing on its tamper-resistant features and addressing common misconceptions. It further discusses physical attacks like evil maid attacks, the security risks associated with leaving a computer unattended, and the use of Chromebooks with Titan chips for enhanced security measures.
You can find Trammell on Twitter at https://twitter.com/qrs, his blog at https://trmm.net/, and his GitHub at https://github.com/osresearch.
Some of the highlights of the show include:
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode