Trusting Your Raspberry Pi - An Introduction to the TPM and IoT
code::dive conference via YouTube
-
21
-
- Write review
Overview
Syllabus
Intro
The Raspberry Pi
How does it boot up
The TPM device driver
Random number generator
Whats inside
Hierarchies
Taking ownership of the TPM
Generating keys
Generating an RSA key
Generating an AS key
Load external keys
Exercise to redux
Encryption
NVRAM
NVRAM area
Measured boot
Default usages
TCG
We faked it
How we faked it
Raspberry Pi
Quote
TPM structure
Remote attestation
Rebooting
How it works
Define NVRAM area
Read from NVRAM area
Evil made attack
Changing the PCR
Backing up data
Open SSL
Safety Critical Systems
Taught by
code::dive conference
Reviews
5.0 rating, based on 1 Class Central review
-
This is superb! Clear, concise and inspirational. Now I properly understand how this works and how I can start my own projects with the TPM. Thankyou