Did you know a TPM can protect the configuration of your software? Learn how to integrate hardware-based security in your solution, identify servers in the network, verify the other systems before exchanging data with them, and more.
Create an Ecosystem of Trust for your next IoT product. Transform fixed system rules into automated device configuration protection that can guarantee also the sensitive user data on board of your device.
All technical information about TPM Stacks and Trusted Computing(TC) software.
Join our community to hear developer interviews and ask your TPM question.
We are making OSS reference applications that everyone could use and customize.
Hardware-based security can not exist without audittable trust anchors.
Meet us at our next casual gathering, we are like to exchange and discuss ideas.
Once a month we have an online call, where we can instantly discuss open topics.
4th of February, collaboration in Zurich
Access Trusted Computing knowledge and tools, software and system architecture discussions