#TPM

2026-02-02

#Flyer von #KDE zum Thema #FOSS gegen #Elektroschrott.

siehe (PDF 9MB): invent.kde.org/teams/eco/opt-g…

Falls ihr #Argumente oder #Fakten braucht für #Linux oder #OpenSource - #Software auf dem #Computer beim Arbeitgeber oder in Behörden. Bitte helft mit damit die #Menschheit auf diesem Planeten eine #Zukunft hat und wir nicht alle in den Fängen von #BigTech enden 🙁

#Floss #OS #Freiheit #Unabhängigkeit #Wirtschaft #Müll #Verschmutzung #Umwelt #Umweltschutz #Klimaschutz #Notebook #Laptop #Schrott #Microsoft #Windows #TPM #endof10 #diday #Resilienz #Demokratie #Politik #Freiheit #Verwaltung #Unabhängigkeit #USA

LΞX/NØVΛ 🇪🇺lexinova@cyberplace.social
2026-01-31

do someone know if the installer of home asistant for x64, allow disk encryption (with potential tpm autounlock ?)

If not do you know a premade that allow it ?

(i ask because i need thread and matter (docker donc support it if i trust their doc), and i would like to maintain encryption on the OS that host it).

#homeassistant @homeassistant #tpm #tpm2 #luks #encryption

Morten LinderudFoxboron@chaos.social
2026-01-29

Heading for #FOSDEM tomorrow!

Reach out if you wanna chat about Secure Boot distro security, TPMs/attestation, reprobuilds or other adjacent topics!

I'll also be at the #ReproducibleBuilds and #ArchLinux BOFs!

#SecureBoot #Security #Linux #TPM

I wonder... If I should bring the trusted platform module ( #TPM) parts in github.com/Lumoin/Verif... online already now. 🤔Protection from "OS compromise". Maybe write a Rust version too at that, at some point. Naturally there is a #BlueSky connection too coming up that uses this system.

RE: https://bsky.app/profile/did:plc:362jgun3je642aevahkfyakw/post/3md6e7wogs22w


GitHub - Lumoin/Verifiable: A ...

Installer Windows 11 25H2 Sans TPM et Sans Compte Microsoft avec Rufus

tube.lacaveatonton.ovh/w/3qsDJ

Japan Pop Newsnews@wakoka.com
2026-01-22

wacoca.com/news/2750323/ シンカナース株式会社が、TOKYO PRO Market上場へ|IPOニュース|日本M&Aセンター TOKYO PRO Market上場支援サービス(J-Adviser) #IPO #JAdviser #JASDAQ #Tokyo #TOKYOPROMarket #TPM #クローズ #スタンダード #プライム #マザーズ #上場 #上場支援サービス #日本M&Aセンター #東京 #東京プロマーケット #東京都 #東証 #東証プロ #東証一部 #東証二部

シンカナース株式会社が、TOKYO PRO Market上場へ|IPOニュース|日本M&Aセンター TOKYO PRO Market上場支援サービス(J-Adviser)
Morten LinderudFoxboron@chaos.social
2026-01-21

Totes deployed device-attest-01 with `attezt` to my local infra, and it works!

#TPM #Attestation #Security

A ~ » step ca certificate \
--attestation-uri 'tpmkms:name=device-key-new' \
--attestation-ca-url 'http://attezt.local:8080' \
--provisioner acme-da test device device.crt

Provisioner: acme-da (ACME)
TPM INFO:
Version: TPM 2.0
Interface: kernel-managed
Manufacturer: Nuvoton Technology (<NTC>, 4E544300, 1314145024)
Vendor info: NPCT75x"!!4rls
Firmware version: 7.2
Using Device Attestation challenge to validate "test" . done!
Waiting for Order to be 'ready' for finalization .. done!
Finalizing Order .. done!
Certificate: device
Private Key: tpmkms:name=device-key-new
N-gated Hacker Newsngate
2026-01-21

In a stunning revelation, the article tells us has existed for over two decades and is now somehow finding its way into embedded systems—shocking! 🚀 Apparently, if you're tinkering with TPM on embedded devices, you should watch out for "pitfalls" and "caveats," because, you know, tech might actually be complex. 😂
sigma-star.at/blog/2026/01/tpm

Sam Lehman :nixos:Lehmanator@fosstodon.org
2026-01-17

@Larvitz How is Step CA? Are you coming from another CA solution?

Been thinking about running #stepca in my #kubernetes cluster, but have been apprehensive because of how many features seem to be gated behind smallstep's proprietary version. Would love to have this integrated with #certmanager and using the #tpm on my nodes. Was going to do a rearchitecting of my entire #auth and #cryptography stack when I switch from the deprecated #Ingress API to the #GatewayAPI

2026-01-11

My efforts at enabling #TPM boot unlock of the root #LUKS volume to get me from two password entries to one backfired, somehow resulting in **three** password entries needed! Still not sure how I managed this, guess I must a genius of some sort. 🤓

2026-01-10

#ollioules #TPM #var #provence

À l'approche des #electionsmunicipales2026 , le Partit Occitan (membre de la fédération "Régions et Peuples Solidaires") appelle à "durbir lei fenestras" (ouvrir les fenêtres) et à soutenir "Ollioules Autrement" , une liste constituée de citoyen·nes ollioulais·es, progressistes, démocrates, à la fibre humaniste, écologique et sociale.

> Page facebook de la liste "Ollioules Autrement" : facebook.com/people/Ollioules-

Mars 2026 : votons « Ollioules Autrement » !Mars 2026 : votons « Ollioules Autrement » !
2026-01-07

Excellent argument from @pluralistic.
pluralistic.net/2026/01/01/39c

"Thanks to Trump's incontinent belligerence, we are on the cusp of a 'Post-American Internet,' a new digital nervous system for the 21st century. An internet that we can build without worrying about America's demands and priorities…The US trade representative has forced every one of its trading partners to adopt #anticircumvention law, to facilitate the extraction of their own people's data and money by American firms…But there's a…response… that's just sitting there, begging to be tried: what about repealing anticircumvention law?"

#Copyright #DRM #RightToRepair #TPM #USLaw #USPol #USPolitics #USTR

joe•iuculano :mastodon:iuculano@masto.ai
2026-01-06

Via #TalkingPointsMemo @ 5:50pm EST on Jan 6, 2026

#Jan6 and the Long Shadow of Civil War and Reconstruction Era Political Violence

This statement by two experts on #CivilWar- and #Reconstruction-era #America was drafted for the #Jan6Committee but not included in its public report. A powerful read, it connects the #PoliticalViolence of the 19th century to today.

#TPM #J6

talkingpointsmemo.com/cafe/jan

Morten LinderudFoxboron@chaos.social
2026-01-05

Would writing/maintain a public for-good Linux TPM attestation service be interesting for people?

Mainly to help people do the attestation part of `device-attest-01` without self-hosting this.

#TPM #Attestation

"Musty Bits" McGeearichtman@eigenmagic.net
2026-01-04

Okay I think I have a better handle on the workflow now. There's 4 hierarchies of trust and you only care about the storage one for my purposes. You can deterministically derive a parent key that's unique to your application based on non confidential secrets. Then from there you can start adding child keys, which when loaded into the module under the parent context can be used to wrap-encrypt your actual key used for decrypting whatever from disk. I'm not quite sure if or why the additional child key is needed but it makes sense you would have some additional indirection beyond the deterministic root key.

There's places to put in particular stuff like a pin or password so you can tie in a user there or just hard code it (or omit, in some cases?).

Anyways, I suppose all this is to achieve that if someone tries to decrypt your stuff with a different TPM it won't work.

I do wonder if you could use the determined root key public certificate to enrol a device as trusted and so long as the server sent you whatever encrypted using the public key it knwlew you'd only get access to it without hardware changes. Though that gets tricky, probably where the attestation/vendor truest hierarchy comes in.

#TPM #TPM2

Erik C. Thauvinethauvin
2026-01-01

The GPU, not the TPM, is the root of hardware DRM

mjg59.dreamwidth.org/70954.html

The GPU, not the TPM, is the root of hardware DRM

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst