Protect your software and its configuration by using a TPM. Learn how to integrate hardware-based identity and security for your projects.
Verify your IoT devices before exchanging data with them. Learn how to build your own Ecosystem of Trust for your next IoT system.
Step by step guides on practical TPM use and system architecture documentation.
Join our community to hear developer interviews and ask your TPM question.
We are making OSS reference applications that everyone can use and customize.
Once every week we take our topics to a live discussion - Join the conversation.
Access computer security knowledge, software and system architecture discussions