Facebook Pixel {العنوان: سلسلة} | {اسم المغناطيس: سلسلة} - {الفئة: سلسلة} - اقرأ هذه القصة على Magzter.com

يحاول ذهب - حر

Trusted Platform Modules: Locksmith in the Basement?

October 2024

|

Open Source For You

Tech giants are embedding special chips into their systems to ensure your data stays safe, even if you lose your device.

- Aditya Mitra and Anisha Ghosh

Trusted Platform Modules: Locksmith in the Basement?

Once upon a time there was a town where people traded very valuable items. But the town had notorious thieves that kept stealing these items. So the people built a special lockbox and kept the items in them for trading. This was a strong box and could not be broken or destroyed to get the contents inside it. The only way to do that was by unlocking it. The box had two keyholes and did not have any fixed keys. A locksmith could make special keys for the box in pairs — if one of the keys in the pair was used to lock the box, only the second key in the same pair could unlock it.

This lockbox was used widely and it worked well. People kept one key of the pair outside their homes in a publicly visible place. Anyone who wanted to give them something made a copy of that key. They then kept that item in the person’s lockbox, used this copied key to lock it, and handed over the box. The second key of the pair was kept by the owner securely and not given to anyone, and only he or she could unlock the box with this second key. The thieves stopped stealing these lockboxes because they were unable to open them without the correct keys.

This worked very well for ages. But then some thieves broke into the homes of people and started stealing the second key that was with the owner. And once they got the key, they stole the contents from the lockboxes. This became a menace in no time as the thieves started stealing the keys from more and more people, who started losing the valuables kept in the lockboxes.

To overcome this challenge, people in the town started making vaults to keep their keys safely. These vaults were unbreakable and strong so the thieves could not steal the keys. The second key was kept in the vault and taken out only when needed.

But this, too, did not work for long because the thieves were able to find the keys to the vault to unlock it. Then they stole the keys from the vault!

المزيد من القصص من Open Source For You

Open Source For You

Open Source For You

Sending IoT Sensor Data to Public or Private Servers

This IoT system shows a simple and effective way to send sensor data using an ESP8266 microchip.

time to read

3 mins

March 2026

Open Source For You

Open Source For You

Popular FOSS Tools for LLM Observability, Monitoring and Evaluation

This overview of popular tools for monitoring large language models also sheds light on how LLM-as-a-judge enhances their performance.

time to read

2 mins

March 2026

Open Source For You

Open Source For You

Data Deduplication Done the Right Way

Deduplication helps to save space on Linux-based storage systems. Choose the right platform and check whether it meets your goals.

time to read

6 mins

March 2026

Open Source For You

Open Source For You

The Relevance of Rubber Duck Debugging in the Age of AI

Discover why rubber duck debugging is a powerful process today. There's also a step-by-step guide on how to use it in the age of artificial intelligence.

time to read

4 mins

March 2026

Open Source For You

Open Source For You

GitHub weighs turning off pull requests as AĬ slop floods projects

GitHub has formally acknowledged that AI-generated 'slop' is overwhelming open source projects, forcing maintainers to sift through poor pull requests (PRS), abandoned submissions and guideline violations - and is now considering restricting or even disabling pull requests, the core mechanism of open collaboration.

time to read

1 min

March 2026

Open Source For You

Open Source For You

Global banks are deploying Ethereum's Layer-2 stack

Banks are standardising on Ethereum's open source stack as production financial infrastructure, shifting from experimental pilots and proprietary blockchains to live Layer-2 networks for tokenised deposits, interbank payments, and cross-border settlement.

time to read

1 min

March 2026

Open Source For You

Open Source For You

OpenClaw's creator joins OpenAl

In a move that reinforces its commitment to open development rather than acquisition, OpenAI has brought Peter Steinberger, founder of OpenClaw, into the company while placing the popular AI agent under a foundation structure to ensure it remains open source.

time to read

1 min

March 2026

Open Source For You

LibreOffice 26.2 comes with native Markdown support

LibreOffice 26.2 has been released by The Document Foundation, strengthening its position as a fully free and open source office suite for Windows, macOS, and Linux, with support for more than 120 languages.

time to read

1 min

March 2026

Open Source For You

Open Source For You

Indian government mandates labelling of Al-generated content and quicker deletion of illegal deepfakes

India has introduced sweeping AI content rules that immediately place pressure on social platforms and open source AI ecosystems to label, trace and rapidly remove AI Open ource synthetic media at scale.

time to read

1 min

March 2026

Open Source For You

Open Source For You

I2C and I3C: How Modern Devices Communicate

I3C and I2C are both two-wire communication protocols that help exchange data between multiple devices. While I3C preserves the simplicity of I2C, it introduces new features suited for today's sensor-rich devices.

time to read

8 mins

March 2026

Listen

Translate

Share

-
+

Change font size