이 콘텐츠는 선택한 언어로 제공되지 않습니다.
1.4. Security
- TPM
- TPM hardware can create, store and use RSA keys securely (without ever being exposed in memory), verify a platform's software state using cryptographic hashes and more. The user space libraries, trousers and tpm-tools, are considered a Technology Preview.