
Description
Check if your Linux computer or phone is trustworthy using TPM2 and cryptography. Generate private keys tied to the device's state for secure signatures. Verify identities or key possession, though phone security depends on the OS. Tools like cryptographic-id-rs and Auditor (Graphene OS) assist with attestation.
Screenshots

Click to view full size

Click to view full size

Click to view full size

Click to view full size

Click to view full size
Click to view full size