Summary
In this chapter, we covered TPM, its versions, and its history. I kept it brief in order to not bore you to death. The point of this book is to help you understand how to make things more secure rather than being an anthology of technological evolution.
You got a rare glimpse into how this understated TPM technology can aid you in automating your appliance’s security. Although TPM is an imperfect solution, it has its merits and its risks. More importantly, you should consider implementing TPM to automate your encrypted filesystems with your product.
In our next chapter, we’ll go even deeper into disk encryption functionality. Let’s move on.
Get This Book's PDF Version and Exclusive ExtrasScan the QR code (or go to packtpub.com/unlock). Search for this book by name, confirm the edition, and then follow the steps on the page. |
|
| ... |

