|
|
Subscribe / Log in / New account

Secure key handling using the TPM

Secure key handling using the TPM

Posted Oct 17, 2018 17:58 UTC (Wed) by jejb (subscriber, #6654)
In reply to: Secure key handling using the TPM by epa
Parent article: Secure key handling using the TPM

> if you can't trust the kernel there are probably equally bad problems as loss of a private key

So there are things you can do about this. A fully untrusted kernel is a hugely difficult problem but a trusted but vulnerable one (meaning it's your kernel but someone could gain access via an exploit) is much easier because the more interception channels you shut down the less likely the exploit is to gain access.

However, the point about the TPM is that even a fully untrusted kernel can't gain access to the key you place in the TPM if you do it correctly. The handheld market is working on this (where you can root the system but can't get access to their credentials) but there's a huge amount of work that goes into "... do it correctly".


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds