You might be interested in this post if you are curious about Linux authentication, don’t know what a TPM actually does, or are interested in the security / UX of Linux desktops.

Or if you wanna use a TPM2-backed PIN to unlock your desktop for some reason.

I’ll talk about PAM generally, explain my motivation for making new PAM modules, and explain some details that I wished were more accessible during my journey to understand how the frick to actually use the TPM.

AI assistance was NOT used in the generation of this blog post. I don’t expect you to read something I couldn’t be bothered to write.

  • felsiq@piefed.zip
    link
    fedilink
    English
    arrow-up
    1
    ·
    6 hours ago

    This is a really cool article and I’m glad the author did this… but I can’t believe nobody’s done this till now. I’m disappointed in myself for not thinking of this earlier lmao