Developer-friendly Trusted Computing

Explore NOW

Welcome, Software Developers

Did you know a TPM can protect the configuration of your software? Learn how to integrate hardware-based security in your solution, identify servers in the network, verify the other systems before exchanging data with them, and more.

Hey, Embedded Systems Engineer

Create an Ecosystem of Trust for your next IoT product. Transform fixed system rules into automated device configuration protection that can guarantee also the sensitive user data on board of your device.

Get started

All resources in one place

All technical information about TPM Stacks and Trusted Computing(TC) software.

Ask a fellow developer

Join our community to hear developer interviews and ask your TPM question.

Open-source reference

We are making OSS reference applications that everyone could use and customize.

Open-Silicon & OSHW

Hardware-based security can not exist without audittable trust anchors.

Open Meetups

Meet us at our next casual gathering, we are like to exchange and discuss ideas.

Join our next online call

Once a month we have an online call, where we can instantly discuss open topics.

Join us at our next Meetup

4th of February, collaboration in Zurich

Join the TPM Developer community

Access Trusted Computing knowledge and tools, software and system architecture discussions