Summary
In this chapter, we covered TPM, its versions, and its history. I kept it brief in order to not bore you to death. The point of this book is to help you understand how to make things more secure rather than being an anthology of technological evolution.
You got a rare glimpse into how this understated TPM technology can aid you in automating your appliance’s security. Although TPM is an imperfect solution, it has its merits and its risks. More importantly, you should consider implementing TPM to automate your encrypted filesystems with your product.
In our next chapter, we’ll go even deeper into disk encryption functionality. Let’s move on.