We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Image-Based Linux and TPMs

00:00

Formal Metadata

Title
Image-Based Linux and TPMs
Subtitle
Measured Boot, Protecting Secrets and you
Title of Series
Number of Parts
542
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Let's look at what Trusted Platform Modules (TPM) chips can do for you, and how they can help protecting your systems from online and offline attacks. We'll specifically focus on Linux image-based OSes, and how to secure them properly with a TPM and related technologies. We'll look at possible avenues for generic Linux distributions to make use of the now ubiquitous TPMs and how to catch up with ChromeOS, Windows and other OSes on this front. We'll discuss concepts such as TPMs, UKIs, SecureBoot, DDIs, dm-verity, LUKS and more.
Data storage deviceHash functionPhysical systemKey (cryptography)MeasurementMiniDiscBootingKeyboard shortcutMinimal surfaceNumberCryptographyComputing platformOperator (mathematics)Hard disk driveFirmwareMereologyExtension (kinesiology)Medical imagingPlastikkarteChainVariety (linguistics)Data dictionaryInformation securityType theoryPartition (number theory)Touch typingTable (information)LaptopFile system1 (number)Process (computing)Configuration spaceVariable (mathematics)WindowMultiplication signSoftwareLatent heatFundamental theorem of algebraPhase transitionSlide ruleRouter (computing)Projective planeEncryptionVolume (thermodynamics)Focus (optics)State of matterPersonal identification numberPasswordArithmetic meanComputer animation
Keyboard shortcutEncryptionBootingFirmwarePrisoner's dilemmaComputer-generated imageryHash functionPhysical systemCodeInformationBootingConfiguration spaceLink (knot theory)FirmwareLaptopFile systemSoftwareElectronic signatureOperations support systemMultiplication signMessage passingKeyboard shortcutLatent heatVulnerability (computing)BitRevision controlPublic-key cryptographyOperator (mathematics)Kernel (computing)State of matterKey (cryptography)MiniDiscCASE <Informatik>WindowMedical imagingMereologyElement (mathematics)Right angleDisk read-and-write headChainMeasurementEncryptionComputer animation
Gamma functionComputer-generated imageryVirtual machinePhysical systemIdentity managementPermianKey (cryptography)BootingPhysical systemPasswordPhase transitionOcean currentLaptopRevision controlFile systemInterior (topology)Computer fileKernel (computing)Context awarenessKeyboard shortcutMeasurementInstallation artIdentity managementVirtual machineGame controllerService (economics)RootHash functionAsynchronous Transfer ModeVolume (thermodynamics)Multiplication signSimilarity (geometry)String (computer science)Latent heatCategory of beingMiniDiscComputer animation
Virtual machineComputer-generated imageryPhysical systemIdentity managementColor managementBit rateVariety (linguistics)File systemBootingData managementPhysical systemMessage passingKernel (computing)EncryptionMeasurementService (economics)Phase transitionPersonal identification numberParameter (computer programming)Server (computing)Level (video gaming)Hash functionRootConfiguration spaceKey (cryptography)ResultantMoving averageIdentity managementBit rateHacker (term)Latent heatMiniDiscComputer hardwareVolume (thermodynamics)Data dictionaryLaptopSign (mathematics)Computer animation
Software2 (number)Goodness of fitBootingConfiguration spaceMedical imagingServer (computing)Physical systemPoint cloudMultiplication signRemote procedure callLaptopWorkloadSource code
Identity managementSoftwareCryptographyMeasurementKernel (computing)PlanningBootingTelecommunicationSoftwareSoftware maintenanceKey (cryptography)Physical systemRootPatch (Unix)Computer fileWindowTracing (software)RotationNumberWritingStandard deviationEvent horizonMultiplication signResultantLibrary (computing)Remote procedure callFile formatHand fanEncryptionMiniDiscInformation securityChainBuildingMereologyLogin2 (number)Block (periodic table)Latent heatSource codeComputer animation
Field (computer science)Computer configurationComputer animation
Image resolutionPower (physics)Error messageInformation privacyKeyboard shortcutKey (cryptography)Data recoveryPasswordMultiplicationPhysical systemDifferent (Kate Ryan album)Computer animation
MIDIImage resolutionComputer multitaskingComputer networkLattice (order)Moment of inertiaBeta functionDuality (mathematics)BuildingOrientation (vector space)Information privacyPower (physics)Data recoveryKey (cryptography)Entropie <Informationstheorie>Distribution (mathematics)Direction (geometry)Program flowchartComputer animation
BuildingAdditionComputer animation
Program flowchart
Transcript: English(auto-generated)