ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,055 results

The Linux Foundation
Using the TPM - It's Not Rocket Science (Anymore) - Johannes Holland & Peter Huewe

Using the TPM - It's Not Rocket Science (Anymore) - Johannes Holland & Peter Huewe, Infineon Technologies AG.

40:23
Using the TPM - It's Not Rocket Science (Anymore) - Johannes Holland & Peter Huewe

19,769 views

5 years ago

media.ccc.de
36C3 -  Hacking (with) a TPM

Whilst "the Trusted Platform Modules available for PCs are not dangerous, and there is no reason not to include one in a computer ...

37:48
36C3 - Hacking (with) a TPM

11,253 views

6 years ago

SUSE Labs
Nicolai Stange Implementing a software TPM in Rust    obstacles, progress and future plans

Trusted Platform Module (TPM) devices play a pivotal role to trusted/confidential computing setups and remote attestation.

33:51
Nicolai Stange Implementing a software TPM in Rust obstacles, progress and future plans

223 views

2 years ago

FOSDEM
Using TPM 2.0 As a Secure Keystore on your Laptop It's not as difficult as you think!

by James Bottomley At: FOSDEM 2018 Room: Janson Scheduled start: 2018-02-04 11:00:00+01.

52:51
Using TPM 2.0 As a Secure Keystore on your Laptop It's not as difficult as you think!

19,618 views

7 years ago

Linux Plumbers Conference
Kicking it up a Level: Bringing the Trusted Platform Module into qemu - Joel Schopp, IBM

Every server with an Intel chip ships with a Trusted Platform Module (TPM). Virtualization of this device is one of the last remaining ...

31:51
Kicking it up a Level: Bringing the Trusted Platform Module into qemu - Joel Schopp, IBM

1,393 views

12 years ago

Mind - Software Consultancy
Mind Tech Talk - TPM - Trusted Platform Module

In a Mind Tech Talk, a Mind colleague guides the participants through a specific technical topic with a Q&A at the end. These take ...

1:05:23
Mind Tech Talk - TPM - Trusted Platform Module

38 views

1 year ago

All Systems Go!
Using Trusted Platform Modules (TPMs) at scale for protecting keys

https://media.ccc.de/v/all-systems-go-2024-292-using-trusted-platform-modules-tpms-at-scale-for-protecting-keys Meta runs a ...

26:09
Using Trusted Platform Modules (TPMs) at scale for protecting keys

563 views

1 year ago

EuroBSDCon
Improving security of FreeBSD with TPM 2.0 and Intel SGX by Kornel Dulęba

Improving security of FreeBSD with TPM 2.0 and Intel SGX The talk describes the concepts behind TPM, together with a short ...

38:50
Improving security of FreeBSD with TPM 2.0 and Intel SGX by Kornel Dulęba

550 views

6 years ago

The Linux Foundation
Using the TPM NVRAM to Protect Secure Boot Keys in POWER9 OpenPOWER Systems - Claudio de Carvalho

In this presentation, Claudio Carvalho will show how the shielded non-volatile memory (NVRAM) of the Trusted Platform Module ...

40:38
Using the TPM NVRAM to Protect Secure Boot Keys in POWER9 OpenPOWER Systems - Claudio de Carvalho

1,874 views

7 years ago

Capitole du Libre
Measured boot: how to link the operating system to the platform integrity — Thomas Perrot

... secure boot and also a little introduction to the Trusted Platform Module (TPM). Finally, I explain how this can be implemented in ...

38:31
Measured boot: how to link the operating system to the platform integrity — Thomas Perrot

235 views

7 years ago

The Linux Foundation
Enhancing Systemd Security Using TPM 2.0 - Bill Roberts, ARM

Enhancing Systemd Security Using TPM 2.0 - Bill Roberts, ARM TPM 2.0 devices are a cryptographic device used for storing ...

33:00
Enhancing Systemd Security Using TPM 2.0 - Bill Roberts, ARM

784 views

1 year ago

DevConf
Applications of TPM 2.0

Topics include protecting secrets with the TPM, measurement of the system and using system information to seal secrets, Trusted ...

51:00
Applications of TPM 2.0

3,130 views

6 years ago

The Linux Foundation
Securing TPM Secrets with TXT and Kernel Signatures - Paul Moore, Cisco

Securing TPM Secrets with TXT and Kernel Signatures - Paul Moore, Cisco Forum 1 Speakers: Paul Moore This presentation will ...

27:00
Securing TPM Secrets with TXT and Kernel Signatures - Paul Moore, Cisco

1,416 views

6 years ago

The Linux Foundation
Using TPMs to Cryptographically Verify Devices at Scale - Matthew Garrett & Tom D'Netto, Google

Using TPMs to Cryptographically Verify Devices at Scale - Matthew Garrett & Tom D'Netto, Google Once a new device leaves IT ...

39:36
Using TPMs to Cryptographically Verify Devices at Scale - Matthew Garrett & Tom D'Netto, Google

6,702 views

6 years ago

SUSE Labs
MicroOS Remote Attestation with TPM and Keylime

This is achieved via the Trusted Platform Module (TPM) co-processor, that can be used as an independent agent that can certify ...

47:04
MicroOS Remote Attestation with TPM and Keylime

483 views

4 years ago

media.ccc.de
36C3 -  Hacking (with) a TPM - deutsche Übersetzung

Whilst "the Trusted Platform Modules available for PCs are not dangerous, and there is no reason not to include one in a computer ...

37:47
36C3 - Hacking (with) a TPM - deutsche Übersetzung

1,118 views

6 years ago

The Linux Foundation
Securing Embedded Linux Systems with TPM 2.0 - Philip Tricca, Intel

... securing embedded Linux systems this talk is a deep dive into enabling and using the new trusted platform module 2.0 (TPM2) ...

51:17
Securing Embedded Linux Systems with TPM 2.0 - Philip Tricca, Intel

31,002 views

8 years ago

The Linux Foundation
Securing TPM Secrets with TXT and Kernel Signatures - Paul Moore, Cisco

Securing TPM Secrets with TXT and Kernel Signatures - Paul Moore, Cisco This presentation will discuss a work in progress to ...

32:54
Securing TPM Secrets with TXT and Kernel Signatures - Paul Moore, Cisco

423 views

6 years ago

OpenSecurityTraining2
Introduction to Trusted Platform Modules (TPMs) TC1101 Lecture D

View the full free MOOC at https://ost2.fyi/TC1101. Trusted Platform Modules (TPM) are the most popular hardware security ...

21:10
Introduction to Trusted Platform Modules (TPMs) TC1101 Lecture D

1,270 views

1 year ago

OpenSecurityTraining2
Introduction to Trusted Platform Modules (TPMs) TC1101 Lecture B 1

View the full free MOOC at https://ost2.fyi/TC1101. Trusted Platform Modules (TPM) are the most popular hardware security ...

26:56
Introduction to Trusted Platform Modules (TPMs) TC1101 Lecture B 1

1,233 views

1 year ago