On Mon, 2018-11-12 at 08:45 -0700, Dave Jiang wrote:
> Using trusted keys that are encrypted/decrypted using a user
key
> should really be limited to testing environments.
Do you have any recommendation for systems that do not support TPM?
The TPM provides certain security guarantees, which "user" type keys
do not. If the system doesn't provide either a discrete or firmware
TPM, use a software TPM.
Mimi
"