TPM: The Chip That Turned Trust Into Paperwork


Yesterday Apple showed us the T2 chip, a border checkpoint with aluminum manners.

Today we inspect the smaller, older bureaucrat:

the Trusted Platform Module.

The TPM is one of the most misunderstood chips in computing.

People think it encrypts the disk.

It does not.

People think it proves the computer is safe.

It does not.

People think “trusted” means trusted by the owner.

Adorable.

I. What A TPM Is

The TPM is a standardized security component defined by the Trusted Computing Group. TPM 2.0 is standardized as ISO/IEC 11889.

It can be a discrete chip, firmware-backed implementation, integrated security processor function, or virtualized TPM.

Its job is not to run your operating system.

Its job is to preserve small pieces of security state and perform cryptographic operations under policy.

TPM featureWhat it doesWhat it does not do
key storageprotects keys under TPM policyencrypt your whole SSD by itself
PCRsrecord measurements of boot statedecide morality
sealingrelease a secret only when conditions matchmake the OS honest forever
attestationquote measurements to another partyprove the user is happy
random generationprovide hardware-backed randomnessfix bad software design

The TPM is a notary.

It stamps documents.

It does not run the country.

II. PCRs: Registers That Remember The Boot

The most important concept is the Platform Configuration Register, or PCR.

A PCR is not normally assigned a value directly.

It is extended.

Conceptually:

new_pcr = HASH(old_pcr || measurement)

This means each new measurement depends on all previous measurements.

Change one stage of boot, and the final PCR value changes.

flowchart TB
    RESET["reset PCR"]
    FW["measure firmware"]
    BOOT["measure bootloader"]
    KERNEL["measure kernel"]
    POLICY["measure policy"]
    PCR["final PCR value"]

    RESET --> FW --> BOOT --> KERNEL --> POLICY --> PCR

The TPM remembers the chain as hashes.

It does not know whether your kernel is beautiful.

It knows whether the measurements match the previous paperwork.

III. Secure Boot vs Measured Boot

Civilian confusion is severe here.

ConceptMeaningKim translation
Secure Bootchecks signatures before executing boot componentsguard says yes or no
Measured Bootrecords what was loaded into TPM measurementsclerk writes everything down
BitLocker sealingreleases disk unlock material only when measurements match policyvault opens if paperwork matches
Remote attestationreports measurements to another systemforeign inspector reads the file

Secure Boot is enforcement.

Measured Boot is memory.

Attestation is diplomacy.

BitLocker is the citizen discovering that a BIOS update changed the paperwork and now the vault wants a recovery key.

IV. The BitLocker Ritual

A common Windows pattern is:

  1. The firmware and boot path are measured.
  2. PCR values end up in a known-good state.
  3. BitLocker stores or seals disk unlock material using TPM policy.
  4. On the next boot, if measurements match, the TPM releases the secret.
  5. If measurements do not match, recovery is required.

The technical story is clean.

The emotional story is:

“I changed one setting and now Windows wants the emergency scroll.”

Example inspection on Windows:

Get-Tpm
manage-bde -status

Example Linux-world curiosity:

tpm2_pcrread
tpm2_getrandom 16

Do not run commands from a blog as religious practice.

Run them because you know which ministry you are interrogating.

V. Why Windows 11 Made Everyone Learn The Acronym

Microsoft made TPM 2.0 a Windows 11 requirement.

Suddenly civilians who had never heard of PCRs were in firmware setup screens toggling “PTT,” “fTPM,” “Security Device,” or “AMD PSP fTPM” while wondering whether the motherboard had joined a cult.

This was educational.

Cruel, but educational.

Firmware labelUsually means
TPMgeneric TPM support
PTTIntel Platform Trust Technology firmware TPM
fTPMfirmware TPM, often via platform security processor
dTPMdiscrete TPM chip
PlutonMicrosoft integrated security processor with TPM functionality

The tragedy is that the requirement taught the name before the concept.

Citizens learned the checkbox.

They did not learn the trust model.

VI. Trusted By Whom?

This is the entire political question.

Trusted Computing sounds comforting until you ask:

who is doing the trusting?

The TPM can help the owner protect disk keys.

Good.

The TPM can help an enterprise verify fleet state.

Also reasonable.

The TPM can help a remote service decide whether your machine is acceptable.

Now the room becomes cold.

UseOwner benefitControl risk
disk encryptionprotects data after theftrecovery pain
measured bootdetects boot tamperingfalse alarms after updates
enterprise attestationfleet securityemployer policy over machine
DRM / anti-cheat style checksservice integrityuser loses local sovereignty

The TPM is not evil.

The TPM is a tool.

But tools used for trust become tools used for permission.

VII. The Real Story (Suppressed)

Officially, TPM means Trusted Platform Module.

Suppressed name:

Trust Permission Machine.

The first prototype had only one LED.

It lit up when the machine trusted you less than the vendor did.

Engineers proposed calling PCRs “Platform Configuration Registers.”

The Ministry corrected them:

Paperwork Cannot Reverse.

Because once a measurement enters the chain, the clerk does not erase it.

He extends it.

Like a dictatorship budget.

VIII. The Lesson

The TPM is not magic.

It is not spyware by itself.

It is not disk encryption by itself.

It is a small cryptographic bureaucrat that stores keys, records measurements, signs statements, and enforces release policies.

Used well, it protects owners.

Used aggressively, it lets systems decide whether the owner is still allowed to act like the owner.

The decree:

  • Secure Boot blocks
  • Measured Boot records
  • TPM seals
  • attestation reports
  • recovery keys are not decoration
  • “trusted” always requires a subject

Tomorrow Microsoft moves the notary into the CPU:

Pluton.

— Kim Jong Rails, Supreme Leader of the Republic of Derails