logoalt Hacker News

red_admiraltoday at 5:29 PM2 repliesview on HN

This is where the whole TPM / trusted computing / secure enclave could be useful to secure developer keys; an unencrypted .ssh/id_rsa file is just too much of a tempting target (also get off RSA already!)


Replies

the8472today at 6:44 PM

You don't need the secure boot machinery for that though, a hardware security token would do and has the advantage that you need to acknowledge actions with a tap

Tangentially, soon all those will be replaced with new hardware supporting PQ signatures.

bob1029today at 5:42 PM

I've started keeping important signing keys in cloud HSM products. Getting AWS KMS to sign a payload is actually very straightforward once you've got your environment variables & permissions set up properly.