I’m curious about the possible uses of the hardware Trusted Protection Module for automatic login or transfer encryption. I’m not really looking to solve anything or pry. I’m just curious about the use cases as I’m exploring network attached storage and to a lesser extent self hosting. I see a lot of places where public private keys are generated and wonder why I don’t see people mention generating the public key from TPM where the private key is never accessible at all.

  • ArbiterXero@lemmy.world
    link
    fedilink
    arrow-up
    6
    ·
    1 year ago

    The problem with this is that the key would be “machine based” and not “person”

    So it’s better for “service accounts”

  • richardisaguy@lemmy.world
    link
    fedilink
    arrow-up
    5
    ·
    1 year ago

    I use it for storing luks credentials, so every time I boot I get dropped at my login manager. It leaves my system vunerable to attacks to it, but its quite convenient.

    Besides, if anyone tries to boot any other OS which is not mine, the keys are erased.

  • astray@lemm.ee
    link
    fedilink
    arrow-up
    2
    ·
    1 year ago

    A security module or a key fob/smart card processes the key internally using its own dedicated ram and cpu without any debugging support. This way, even something will full ram and cpu access or a compromise of your machine, there is no way to export or access the key. Data is passed to the module and it returns the scrambled or unscrambled result based on the key which no body knows or has ever seen. A key locked with no way to access can’t be hacked without physically stealing the module, which is where your pin comes in to save you. The TPM is a very important part of a secure boot chain. If you want to secure other things I wouldn’t blame you for using a separate module or fob that isn’t always connected util it’s actually needed and it should only be activated with a physical button or something so you have to be present to engage with it. This adds even more security. So you could use the TPM for boot chain security and a separate fob or data privacy for example.

  • penquin@lemm.ee
    link
    fedilink
    arrow-up
    2
    ·
    1 year ago

    It scares me. What if the chip dies? How am I gonna be able to get my stuff? I don’t fully understand how it works, but where is the encryption saved? On the chip itself or somewhere else?

    • °˖✧ ipha ✧˖°@lemm.ee
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      What if the chip dies? How am I gonna be able to get my stuff?

      You can have backup keys, but if you don’t have that then your data is gone.

      I don’t fully understand how it works, but where is the encryption saved? On the chip itself or somewhere else?

      Encryption key is stored in the TPM chip.

      • penquin@lemm.ee
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        Ok this is scary. Lol Unless you have those backup keys then it’s a bit better.

  • gregorum@lemm.ee
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 year ago

    Outside of Microsoft and Windows, what’s the application for it? Does Linux or UNIX have much use for TPM? Pardon, my ignorance, but I bet this is a good place to ask!

  • Discover5164@lemm.ee
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    1 year ago

    i use it to auto unlock luks. if someone messed with the hardware/ bios, it will ask for the password next boot.