
Description
Check if a Linux computer or phone is in a trustworthy state using TPM2 and asymmetric cryptography. Generate private keys tied to the device's state, ensuring secure signatures. Verify identities or possession of private keys, though phone security depends on the OS. Tools like cryptographic-id-rs and Auditor (Graphene OS) help with attestation.
Screenshots

Click to view full size

Click to view full size

Click to view full size

Click to view full size

Click to view full size

Click to view full size

Click to view full size

Click to view full size