Versuchen GOLD - Frei
Trusted Platform Modules: Locksmith in the Basement?
Open Source For You
|October 2024
Tech giants are embedding special chips into their systems to ensure your data stays safe, even if you lose your device.

Once upon a time there was a town where people traded very valuable items. But the town had notorious thieves that kept stealing these items. So the people built a special lockbox and kept the items in them for trading. This was a strong box and could not be broken or destroyed to get the contents inside it. The only way to do that was by unlocking it. The box had two keyholes and did not have any fixed keys. A locksmith could make special keys for the box in pairs — if one of the keys in the pair was used to lock the box, only the second key in the same pair could unlock it.
This lockbox was used widely and it worked well. People kept one key of the pair outside their homes in a publicly visible place. Anyone who wanted to give them something made a copy of that key. They then kept that item in the person’s lockbox, used this copied key to lock it, and handed over the box. The second key of the pair was kept by the owner securely and not given to anyone, and only he or she could unlock the box with this second key. The thieves stopped stealing these lockboxes because they were unable to open them without the correct keys.
This worked very well for ages. But then some thieves broke into the homes of people and started stealing the second key that was with the owner. And once they got the key, they stole the contents from the lockboxes. This became a menace in no time as the thieves started stealing the keys from more and more people, who started losing the valuables kept in the lockboxes.
To overcome this challenge, people in the town started making vaults to keep their keys safely. These vaults were unbreakable and strong so the thieves could not steal the keys. The second key was kept in the vault and taken out only when needed.
But this, too, did not work for long because the thieves were able to find the keys to the vault to unlock it. Then they stole the keys from the vault!
Diese Geschichte stammt aus der October 2024-Ausgabe von Open Source For You.
Abonnieren Sie Magzter GOLD, um auf Tausende kuratierter Premium-Geschichten und über 9.000 Zeitschriften und Zeitungen zuzugreifen.
Sie sind bereits Abonnent? Anmelden
WEITERE GESCHICHTEN VON Open Source For You

Open Source For You
A Simple System that Uses Duplicati for Backing Up Data
The open source based data backup system outlined here can be really useful for a small office home office setup. Learn how to set up Duplicati on Windows, back up data to a Linux server, schedule daily backups, secure them with encryption, restore files when needed, and receive email notifications.
9 mins
August 2025
Open Source For You
Lisp for Robotics: Implementing Graph Traversal
Created in 1959 by John McCarthy, Lisp is a programming language designed to manipulate symbolic data easily, which is a key characteristic of AI. This language is still used for prototyping and to demonstrate different AI concepts. Here's a short tutorial on how it can help to implement three graph traversal algorithms.
5 mins
August 2025
Open Source For You
LibreOffice 25.2.5 is stable and reliable after 63 bug fixes
The Document Foundation has officially released LibreOffice 25.2.5, the fifth maintenance update in the LibreOffice 25.2 series.
1 min
August 2025

Open Source For You
The Evolution of PostgreSQL in the Age of AI
PostgreSQL, enhanced with the pgvector extension, brings semantic search capabilities into a traditional SQL environment. With support for both structured queries and Al-driven search, pgvector enables developers to build intelligent, cost-effective applications within a familiar ecosystem, positioning PostgreSQL as a future-ready, Al-native database. Let's learn more....
5 mins
August 2025

Open Source For You
Calico: Open source platform for Kubernetes networking, security, and observability is in version 3.30
Calico is an open source, unified platform that integrates networking, security, and observability for Kubernetes environments—whether deployed in the cloud, on-premises, or at the edge.
1 min
August 2025

Open Source For You
Red Hat launches RHEL for Business Developers
Red Hat has announced Red Hat Enterprise Linux for Business Developers, a new self-service offering aimed at simplifying access to its flagship enterprise Linux platform for development and testing.
1 min
August 2025

Open Source For You
Data Governance in the Digital Era: An Overview
Data governance plays a critical role in ensuring effective data management in an organisation. Businesses who invest in it are at a definite advantage over those who don't.
7 mins
August 2025

Open Source For You
Shape the Success of Your Business with Smart Data Management and Security Practices
In today's world, data is a company's best asset, if used well. Also, data management and data security are no longer merely good business practices - they are critical to the success of an organisation.
6 mins
August 2025
Open Source For You
Wireshark 4.4.8 comes with updated protocol support and key bug fixes
The Wireshark team has announced the release of Wireshark 4.4.8, the eighth maintenance update in the 4.4 stable series of the world's most popular open source network protocol analyser.
1 min
August 2025

Open Source For You
HealSphere: An Open Source-Based Mental Health Support Platform
This real-world CI/CD implementation has been developed using open source tools to deploy a modular mental health support platform.
11 mins
August 2025
Listen
Translate
Change font size