tpm   1017

« earlier    

IRID9670TPM20LINUXTOBO1 Infineon Technologies | Mouser
IRID9670TPM20LINUXTOBO1 Infineon Technologies Security / Authentication Development Tools OPTIGA TPM SLB 9670 TPM2.0 Infineon's Trusted Platform Module (TPM) SLB9670 is a fully TCG standard compliant TPM 2.0 with a SPI interface. datasheet, inventory, & pricing.
tss  infineon  tcg  tpm 
7 weeks ago by arisco97
Standards for a highly secure Windows 10 device | Microsoft Docs
New MS minimum specs for high security Windows 10 setups. Nothing terribly surprising, but the push to hypervisor based security means they are slowly starting to push towards a Qubes approach?
windows  10  hardware  requirement  security  TPM  secure  boot  SLAT  IOMMU  64bit  hypervisor  guard 
november 2017 by asteroza
Can Bitlocker be used in a dual boot system with Windows on one drive, Linux on another? - Super User | https://superuser.com/
Not sure if the solution here (https://blogs.technet.microsoft.com/voy/2006/10/13/how-to-use-windows-vistas-boot-manager-to-boot-linux/) would work with TPM or not, but it seems like it would

It uses a boot sector from the Linux partition (you have to tell GRUB to install to the primary/logical partition, rather than the MBR) and BCDEDIT.EXE to create a separate menu entry for the Linux OS.
linux  windows  dualboot  tpm  bitlocker 
october 2017 by kme
Millions of high-security crypto keys crippled by newly discovered flaw | Ars Technica
The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli, which will be presented on November 2 at the ACM Conference on Computer and Communications Security. The vulnerability was discovered by Slovak and Czech researchers from Masaryk University in the Czech Republic, Enigma Bridge in Cambridge, UK, and Ca' Foscari University in Italy. To give people time to change keys, the paper describing the factorization method isn't being published until it's presented at the conference.

The flaw resides in the Infineon-developed RSA Library version v1.02.013, specifically within an algorithm it implements for RSA primes generation. The library allows people to generate keys with smartcards rather than with general-purpose computers, which are easier to infect with malware and hence aren't suitable for high-security uses. The library runs on hardware Infineon sells to a wide range of manufacturers using Infineon smartcard chips and TPMs. The manufacturers, in turn, sell the wares to other device makers or end users. The flaw affects only RSA encryption keys, and then only when they were generated on a smartcard or other embedded device that uses the Infineon library.

Factorizing a 2048-bit RSA key generated with the faulty Infineon library, by contrast, takes a maximum of 100 years, and on average only half that. Keys with 1024 bits take a maximum of only three months.

Both the flawed Infineon library and the Taiwanese digital ID system passed the FIPS 140-2 Level 2 and the Common Criteria standards. Both certifications are managed by the National Institute of Standards and Technology. Both certifications are often mandatory for certain uses inside government agencies, contractors, and others.
cybersecurity  tpm  rsa  crypto 
october 2017 by bwiese

« earlier    

related tags

*  10  19th_century  2016  2016election  64bit  adexchange  advertising  ag  agile  android  antitrust  article  attestation  au  authentication  belarus  bernie  bitlocker  blacklisting  blog  blogs  book  boot  businessmodels  c  cac  canada  card  ccc  censorship  certificate  chat  check  christie  chrome  chromebook  chromeos  circumvention  civil_war  clips  code  computaional_advertising  computing  consoles  container  copyright  counsel  cracking  cruz  crypto  cryptography  cybersecurity  defense  delicious  dev  disk_encryption  diy  donaldtrump  doubleclick  drm  dsec  dualboot  election-2018  email  encryption  engagement  europe  event  evil-maid  exploit  face  fic  foreignpolicy  garret  gawker  gen  general  generator  gmail  golang  google  googleanalytics  googlechrome  guard  hack  hacking  hardware  hibernation  history  howto  hsm  hypervisor  ibm  infineon  iommu  josh.marshall  josh  joshmarshall  journalism  juliepace  kerberos  kernel  key  keygen  laptop  law  library  librem  linux  locks  logs  lpc  lsm  mac  management  manager  market_microstructure  marshall  mascots  master  matthew  maybesolution  media  meta  microeconomics  mikeflynn  mmist  module  monopoly  mueller  muellerinvestigation  nap  nas  news  news_media  nieman  nintendo  notes  os  osx  paywalls  peterthiel  pg  piv  pki  platform  plugin  poland  politics  power  privacy  priviledgeescalation  program  programming  publishing  purism  purpose  qtr_calls  qubes  quora  racism  random  randomness  recommended_by  redskins  reference  remote  requirement  rng  rosenstein  rsa  rubio  russia  scrum  search  secrecy  secure  security  sessions  slat  slavery  slides  smartcard  society  spam  special  ssh  starwars  subscription  support  system  talk  talkingpointsmemo  tcg  techdirt  tips  titan  tmux  todo  tor  totp  trump  trumpadministration  trust  trusted-computing  trusted  tss  united_states_of_america  usb  virtualization  vtpm  vulnerability  weak  windows  x86  セキュリティ 

Copy this bookmark:



description:


tags: