The Trusted Platform Module
Commonly just called TPM, short for Trusted Platform Module, this security-focused microcontroller chipset uses advanced cryptography to store critical or sensitive information. This could be in the form of credentials, passwords, biometrics, encryption keys, or other very sensitive data.
The exercises in this chapter will challenge your perceptions of what can or should be automated in an appliance. In this chapter, we will build upon methodologies to leverage this tool to further automate your encrypted passphrase authentication within your solutions, as initially introduced in Chapter 6. TPM, when leveraged properly, can become your enabler to a higher level of security and positive end-user experience. That said, TPM is not without its drawbacks and eccentric warts. It is notoriously not user-friendly and, sometimes, some of its registers can be unreliable. Whether or not this is a hardware or software issue, I know not. Regardless, I will demonstrate...