Site in costruction

Exobrain

Home of inorganic intellectual chaos and unpolished content

Trusted Computing for Power Users

Intro to Trusted Computing and TPM

OEM Exploitation

Trusted Computing devices

Designing a trusted system

Building a trusted computer

Archieving full stack security

Conclusion and ideas for the future