Four researchers from the National Security Research Institute of South Korea have figured out (PDF) that there are some exploitable flaws in the Trusted Platform Module 2.0, which has been around ...
A Trusted Platform Module (TPM) can securely store cryptographic keys that are specific to the host system and provide restricted access to the stored keys and secrets. You can never read out private ...