{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreibs444fg5t2gc7sawhbwb5f6iyvgicm4hpjpxsr6jdsybzhjci37i",
    "uri": "at://did:plc:uxkrhzvf6obbsoh5nf2gkpj5/app.bsky.feed.post/3mk5khxlgolz2"
  },
  "path": "/hardware-backed-security-using-wolftpm-with-spdm/?utm_source=rss&utm_medium=rss&utm_campaign=hardware-backed-security-using-wolftpm-with-spdm",
  "publishedAt": "2026-04-22T17:00:20.000Z",
  "site": "https://www.wolfssl.com",
  "tags": [
    "wolfTPM",
    "Uncategorized"
  ],
  "textContent": "Encrypted Bus Transfers, Multi-Vendor TPM Support, and TCG SPDM Binding Your Secrets Are on the Wire The Problem Discrete TPM chips talk to the host CPU over physical buses: SPI, I2C, or LPC. By default, this communication is unencrypted. Security researchers have repeatedly demonstrated that an attacker with brief physical access can tap these buses […]",
  "title": "Hardware-Backed Security Using wolfTPM with SPDM"
}