{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreibs444fg5t2gc7sawhbwb5f6iyvgicm4hpjpxsr6jdsybzhjci37i",
"uri": "at://did:plc:uxkrhzvf6obbsoh5nf2gkpj5/app.bsky.feed.post/3mk5khxlgolz2"
},
"path": "/hardware-backed-security-using-wolftpm-with-spdm/?utm_source=rss&utm_medium=rss&utm_campaign=hardware-backed-security-using-wolftpm-with-spdm",
"publishedAt": "2026-04-22T17:00:20.000Z",
"site": "https://www.wolfssl.com",
"tags": [
"wolfTPM",
"Uncategorized"
],
"textContent": "Encrypted Bus Transfers, Multi-Vendor TPM Support, and TCG SPDM Binding Your Secrets Are on the Wire The Problem Discrete TPM chips talk to the host CPU over physical buses: SPI, I2C, or LPC. By default, this communication is unencrypted. Security researchers have repeatedly demonstrated that an attacker with brief physical access can tap these buses […]",
"title": "Hardware-Backed Security Using wolfTPM with SPDM"
}