Reason I’m asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

  • solrize@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    15 hours ago

    My machines are old enough to not have that, so no. But, there are a lot of tpm implementations and I don’t think they are backdoored in general. I know of some industry projects to use them in data centers. Otoh they often have vulnerabilities.

    If I wanted a hardware token I’d use a dedicated one but that’s just me.