DevConf.CZ 2026

The TPM as an everyday security tool
2026-06-18 , D105 (capacity 300)

Your computer has a TPM (Trusted Platform Module), but are you actually using it? Despite being ubiquitous in modern hardware, this dedicated security processor remains one of the most underutilized components in the standard security stack. This introductory talk aims to make accessible the use of this chip.

We will start with the fundamentals of TPM architecture, then we will quickly move into a few high-impact, low-effort real world use cases to leverage your TPM for a more secure and seamless workflow. Whether you are securing your SSH keys or automating disk decryption, you will leave with a clear understanding of how the hardware works and a toolkit of practical examples you can implement immediately.


Experience level: Beginner - no experience needed

Roberto is an open source and free/libre culture enthusiast, he currently works at Red Hat, more specifically in the Pipeline Security team.