hucste@lemmy.ml to Debian operating system@lemmy.mlEnglish · 11 months agoProtecting SSH keys with TPM 2.0, now available on Debianblog.ledger.comexternal-linkmessage-square3fedilinkarrow-up150arrow-down10
arrow-up150arrow-down1external-linkProtecting SSH keys with TPM 2.0, now available on Debianblog.ledger.comhucste@lemmy.ml to Debian operating system@lemmy.mlEnglish · 11 months agomessage-square3fedilink
minus-squareCoelacanthus@lemmy.kde.sociallinkfedilinkarrow-up1·10 months agoI prefer use Yubikey/Canokey instead of TPM. SSH key may be used outside or in other environment (such as my laptop, Android or iPad). And TPM support less algorithms than Yubikey, especially Ed25519 and RSA4096.
I prefer use Yubikey/Canokey instead of TPM. SSH key may be used outside or in other environment (such as my laptop, Android or iPad). And TPM support less algorithms than Yubikey, especially Ed25519 and RSA4096.