• ClipSaver
  • dtub.ru
ClipSaver
Русские видео
  • Смешные видео
  • Приколы
  • Обзоры
  • Новости
  • Тесты
  • Спорт
  • Любовь
  • Музыка
  • Разное
Сейчас в тренде
  • Фейгин лайф
  • Три кота
  • Самвел адамян
  • А4 ютуб
  • скачать бит
  • гитара с нуля
Иностранные видео
  • Funny Babies
  • Funny Sports
  • Funny Animals
  • Funny Pranks
  • Funny Magic
  • Funny Vines
  • Funny Virals
  • Funny K-Pop

36C3 - Hacking (with) a TPM скачать в хорошем качестве

36C3 - Hacking (with) a TPM 6 лет назад

скачать видео

скачать mp3

скачать mp4

поделиться

телефон с камерой

телефон с видео

бесплатно

загрузить,

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
36C3 -  Hacking (with) a TPM
  • Поделиться ВК
  • Поделиться в ОК
  •  
  •  


Скачать видео с ютуб по ссылке или смотреть без блокировок на сайте: 36C3 - Hacking (with) a TPM в качестве 4k

У нас вы можете посмотреть бесплатно 36C3 - Hacking (with) a TPM или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:

  • Информация по загрузке:

Скачать mp3 с ютуба отдельным файлом. Бесплатный рингтон 36C3 - Hacking (with) a TPM в формате MP3:


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса ClipSaver.ru



36C3 - Hacking (with) a TPM

https://media.ccc.de/v/36c3-10564-hac... Don't ask what you can do for TPMs, Ask what TPMs can do for you Trusted Platform Modules (TPMs) are nowadays included in all consumer-grade devices. Whilst "the Trusted Platform Modules available for PCs are not dangerous, and there is no reason not to include one in a computer or support it in system software" (Richard Stallman, GNU) they have yet to gain wide-ranged adoption, especially for the daily needs of your average nerd. This talk will introduce OpenSource software and use cases that are already supported and how your everyday nerd can benefit from those by security your personal credentials, securing your system credentials, encrypting your storage and detecting BIOS manipulations. This talk is based on the https://tpm2-software.github.io contributions. It will also give a quick rundown to debunk some myths and call for participation in the OpenSource efforts for supporting more use cases via TPMs. TPMs provide several features. Most talked about are the capabilities to perform "attestations", i.e. to reliably determine the software (BIOS, OS, applications) that are running on a given system. Most commonly useful are its capabilities to act similar to a "built-in smartcard". It provides storage for keys and secrets on the device that can be protected by PINs, i.e. that are protected against bruteforce attacks. It further provides an encrypted swapping mechanism for such keys, enabling almost infinitely large storage for said keys. With this range of features available at your average nerd's disposal, it would be a shame not to use them. 1. Securing your personal credentials The most frequent application of TPMs stems from logging into other system. This includes ssh client logins or browser based https client certificates and becomes even more frequent when put into context with git+ssh, git+https, sftp or webdav. All these technologies and mostly all implementation support PKCS11 to allow storage of secrets on a smartcard. But SmartCards or Yubikeys require extra readers, occupy USB-slots, have to be carried around. The tpm2-pkcs11 library allows anyone to seamlessly use the TPM instead of an external smartcard. This approach provides much higher convenience compared to smartcards and even compared to passwords, since you merely need a short pin instead of a username+vErys3cur3passwor! combinations. It maps the smartcards property of possession to possession of the device, i.e. notebook. 2. Securing your system credentials Heartbleed is old but the principle problem of having keys lay around in RAM and disk is as relevant as it used to be. This is where the tpm2-tss-engine for OpenSSL comes into play. It allows the use of TPM-based keys for authentication via TLS (server and client side). Of course, if your system get's owned, it's owned, but once the attacker is gone (reboot, update, etc), you can be sure that he could not have copied the private key. Thus, no revocation or similar action is needed. 3. Encrypting your storage Basically "BitLocker for Linux" is the keyword. By extending LUKS(2) and cryptsetup, we're enabling anyone to encrypt their disk and protect there data from bruteforce password guessing if the device or disk ever got stolen. This even provides a lot more convenience, since the TPM operations can be faster than the typical KDF'ing and you can work with PINs and short passwords instead of vErys3cur3passwor! ones. 4. Detecting BIOS manipulations Talks and news about evil maids, government trojans installed at airport inspections and BIOS-based backdoors are present anywhere. The tpm2-totp project is a clone of Matthew Garrets tpm-totp that he presented at 32c3. It enable the user to authenticate not only the device to be theirs, but also if the BIOS and kernel are still in the same state as they were when they left it. Most use cases are actually running code shipping with more and more distros. The talk will give some deeper explanations into each of these and possibly some live demos. Andreas Fuchs https://fahrplan.events.ccc.de/congre...

Comments
  • 36C3 -  No source, no problem! High speed binary fuzzing 6 лет назад
    36C3 - No source, no problem! High speed binary fuzzing
    Опубликовано: 6 лет назад
  • Using TPM 2.0 As a Secure Keystore on your Laptop It's not as difficult as you think! 8 лет назад
    Using TPM 2.0 As a Secure Keystore on your Laptop It's not as difficult as you think!
    Опубликовано: 8 лет назад
  • ИИ-агенты — кошмар для безопасности? Разбираемся с OpenClaw 5 дней назад
    ИИ-агенты — кошмар для безопасности? Разбираемся с OpenClaw
    Опубликовано: 5 дней назад
  • 36C3 -  The One Weird Trick SecureROM Hates 6 лет назад
    36C3 - The One Weird Trick SecureROM Hates
    Опубликовано: 6 лет назад
  • Securing Embedded Linux Systems with TPM 2.0 - Philip Tricca, Intel 8 лет назад
    Securing Embedded Linux Systems with TPM 2.0 - Philip Tricca, Intel
    Опубликовано: 8 лет назад
  • Мир AI-агентов уже наступил. Что меняется прямо сейчас 7 часов назад
    Мир AI-агентов уже наступил. Что меняется прямо сейчас
    Опубликовано: 7 часов назад
  • Поиск работы стал унижением — за что ненавидят HR 6 дней назад
    Поиск работы стал унижением — за что ненавидят HR
    Опубликовано: 6 дней назад
  • Casting SALT like Metal - What Happens? 2 дня назад
    Casting SALT like Metal - What Happens?
    Опубликовано: 2 дня назад
  • «Аттестация на основе TPM — как мы можем использовать её во благо?» — Мэтью Гарретт (LCA 2020) 6 лет назад
    «Аттестация на основе TPM — как мы можем использовать её во благо?» — Мэтью Гарретт (LCA 2020)
    Опубликовано: 6 лет назад
  • TPM (Trusted Platform Module) - Computerphile 4 года назад
    TPM (Trusted Platform Module) - Computerphile
    Опубликовано: 4 года назад
  • 36C3 -  SIM card technology from A-Z 6 лет назад
    36C3 - SIM card technology from A-Z
    Опубликовано: 6 лет назад
  • 36C3 -  Intel Management Engine deep dive 6 лет назад
    36C3 - Intel Management Engine deep dive
    Опубликовано: 6 лет назад
  • Всего 40 строк кода 5 дней назад
    Всего 40 строк кода
    Опубликовано: 5 дней назад
  • Trusting your Raspberry Pi - An introduction to the TPM and IoT - Ian Oliver - code::dive 2019 6 лет назад
    Trusting your Raspberry Pi - An introduction to the TPM and IoT - Ian Oliver - code::dive 2019
    Опубликовано: 6 лет назад
  • Plan 9: Not dead, Just Resting, by Ori Bernstein 6 лет назад
    Plan 9: Not dead, Just Resting, by Ori Bernstein
    Опубликовано: 6 лет назад
  • 36C3 -  A systematic evaluation of OpenBSD's mitigations 6 лет назад
    36C3 - A systematic evaluation of OpenBSD's mitigations
    Опубликовано: 6 лет назад
  • Освоение TPM: инсайдерская информация для ИТ-специалистов 6 лет назад
    Освоение TPM: инсайдерская информация для ИТ-специалистов
    Опубликовано: 6 лет назад
  • Using TPMs to Cryptographically Verify Devices at Scale - Matthew Garrett & Tom D'Netto, Google 6 лет назад
    Using TPMs to Cryptographically Verify Devices at Scale - Matthew Garrett & Tom D'Netto, Google
    Опубликовано: 6 лет назад
  • Ferrite Rings, What Are They Used For? 7 часов назад
    Ferrite Rings, What Are They Used For?
    Опубликовано: 7 часов назад
  • Using the TPM - It's Not Rocket Science (Anymore) - Johannes Holland & Peter Huewe 5 лет назад
    Using the TPM - It's Not Rocket Science (Anymore) - Johannes Holland & Peter Huewe
    Опубликовано: 5 лет назад

Контактный email для правообладателей: u2beadvert@gmail.com © 2017 - 2026

Отказ от ответственности - Disclaimer Правообладателям - DMCA Условия использования сайта - TOS



Карта сайта 1 Карта сайта 2 Карта сайта 3 Карта сайта 4 Карта сайта 5