We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Having Something To Hide

Formal Metadata

Title
Having Something To Hide
Subtitle
Trusted Key Storage in Linux
Title of Series
Number of Parts
542
Author
Contributors
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
From the workstation /home partition to a certificate store on an embedded system, use cases abound for encrypting data at rest. The common goal is thwarting offline attacks by keeping the plaintext key material safe from where an attacker could extract it. In his talk, Ahmad will give a brief introduction to the kernel's trusted key subsystem and his work in enabling it for unattended disk decryption on NXP's i.MX line of embedded SoCs.