I’m curious about the possible uses of the hardware Trusted Protection Module for automatic login or transfer encryption. I’m not really looking to solve anything or pry. I’m just curious about the use cases as I’m exploring network attached storage and to a lesser extent self hosting. I see a lot of places where public private keys are generated and wonder why I don’t see people mention generating the public key from TPM where the private key is never accessible at all.

  • Kool_Newt@lemm.ee
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Personally, I don’t see how a TPM module is more useful than full disk encryption with a password you enter on boot.

    As I understand, the significant advantage of using TPM is that your private key cannot be stolen. There is no way to take the key from the machine, an attacker would need to access the target resource using your private key from your computer.