Reason I’m asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?
Reason I’m asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?
My machines are old enough to not have that, so no. But, there are a lot of tpm implementations and I don’t think they are backdoored in general. I know of some industry projects to use them in data centers. Otoh they often have vulnerabilities.
If I wanted a hardware token I’d use a dedicated one but that’s just me.