With approaches dating back to the 20th century, the idea of a TPM is simple: An
isolated, constrained environment to offload trust establishment in a larger
computing environment. That implies cryptography, firmware, hardware, and per
application, different requirements. This talk elaborates on how the seemingly
simple concept has been expanded over the years, enumerating implementations in
hardware, firmware, other layers of software, and even web browsers, explaining
why it is in fact far more complex than anticipated by looking at contemporary
use-cases, ending up with a discussion around the controversy about Microsoft
mandating presence of a TPM in order to run Windows 11.
00:00 Intro
00:15 Herald
01:02 Start Session
01:50 Agenda
02:22 Introduction
03:02 TPM History
16:25 Development of Specification
38:45 References
39:06 Q&A Session
41:01 Outro