I’m curious about the possible uses of the hardware Trusted Protection Module for automatic login or transfer encryption. I’m not really looking to solve anything or pry. I’m just curious about the use cases as I’m exploring network attached storage and to a lesser extent self hosting. I see a lot of places where public private keys are generated and wonder why I don’t see people mention generating the public key from TPM where the private key is never accessible at all.
As I understand, the significant advantage of using TPM is that your private key cannot be stolen. There is no way to take the key from the machine, an attacker would need to access the target resource using your private key from your computer.