On 13/09/2022 23:50, Demi Marie Obenour wrote:
Another option is a TPM-based authenticator. Would this be
acceptable?
No. TPM 2.0 chip is a *proprietary* black box. Some of them have known
critical security vulnerabilities[1].
[1]:
https://arstechnica.com/gadgets/2021/08/how-to-go-from-stolen-pc-to-netwo...
--
Sincerely,
Vitaly Zaitsev (vitaly(a)easycoding.org)