Jump to content



Photo
trusted computing group tcg trusted platform module tpm tpm 1.2 tpm 2.0

  • Please log in to reply
No replies to this topic

#1 Ian W

Ian W

    Neowinian Werewolf

  • 1,562 posts
  • Joined: 01-March 13
  • OS: Windows Vista

Posted 29 July 2014 - 05:19

Secure is the New Black: The Evolution of Secure Mobile Technology for Government Agencies
Full article: http://www.federalte...nment-agencies/

This article is somewhat old . . . but it was recently shared by the Trusted Computing Group on July 28, 2014. It is currently on the front page.


The CSD 3324 telephone and fax system has provided the Department of Defense (DoD) with secure voice and fax communications for years. Using the AES 256-bit encryption algorithm and the Diffie-Hellman key exchange, this old work horse ensures that all messages get through safely. So if outdated voice and fax technology can be secure, then why can’t mobile devices?

For years in the DoD, desktops have been protected by technology known as trusted computing. At first highly mobile laptops like the Samsung Chrome Book or the Sony Ultra Book had the Trusted Platform Module (TPM) chip embedded on the motherboard.  But now virtually every laptop has a TPM chip that is enabled in the operating system.

. . .

In its simplest form, a TPM mobile chip provides a secure storage location for certificates and encryption keys that is separate from other memory. Experts warn that TPM is not a panacea and must be used in conjunction with other security measures such as malware and anti-virus protection, whole disk encryption, and strong passwords or two-factor authentication.