Skip to content

TPM Software Stack (TSS2) - Release 4.1.1 - LetsTrust-TPM2Go support by default!

Hello everyone,

and the second news today: The TPM Software Stack (TSS) now also supports the LetsTrust-TPM2Go as TCTI device with the latest release!

What's new about this, the LT-TPM2Go has been working with the TSS for over 6 months?
That is correct, but only if you have rebuilt the TSS from the master.
In the near future, everything will be easier with the current release, then these three steps will be sufficient (also applies to the SPI-based LetsTrust-TPM).

# install all tpm2 relevant software and tools
sudo apt --yes install libtss2-* tpm-udev tpm2-abrmd tpm2-tools

# Add the current user to group tss (with privilege to access the TPM)
sudo usermod --append --groups tss $(whoami)

# Reboot for group change to become effective
sudo reboot

You see, it goes on and on with the TPM!

Bye, for now

Categories: TPM

Product Change Notification - LetsTrust-TPM

Hello to everyone,

I have a product change notification for you today! (PCN)

LetsTrust-TPM gets a new chip. The usual Infineon quality remains and from now on the SLB9672 FW15.23 will be used!

What will change? Basically nothing for the user, the config.txt change remains as before, the devicetree overlay is loaded via -> dtoverlay=tpm-slb9670. Because the SLB9672 is 100% driver compatible with the old overlay (yay!)

We were also able to retain the layout, because the SLB9672, like the SLB9670, follows the specifications of the TCG (Trusted Computing Group) regarding the pinout and the package.

Only the TCG Spec version changes, here we have to take what we get from Infineon. The latest firmware version is based on the specification revision Rev.:1.59 and no longer on Rev.:1.38 as before (higher is better).

This change is effective as of Monday, May 13th. All LetsTrust-TPMs ordered from then on will be on the latest possible version!

Bye for now,

Categories: TPM

New LetsTrustTPM2Go project

Hello everybody,

David Safford send me a link to his latest github project! I think it is worth it to share!

From his github project:

This package demonstrates a simple recovery mechanism for data across a TPM (or motherboard) failure.

However, i fond a second project from David:

Really nice stuff :-)

Maybe someone have ideas, please contribute :-)

Bye for now,

Categories: TPM

TPM and BitLocker

Hello everyone,

usually once a year someone comes around the corner and shouts into the ether of the net: LOOK AT ME! I HAVE HACKED A TPM!

Well, during this time I always get a lot of emails/messages or direct questions in the corridor "how can that be?" "aren't TPMs so good after all...?" "ahh, just security bohei and nothing behind it"

There are enough articles out there that explain this, so I won't start here, but you can find a link to one here: This article sums it up very well, so Thanks to Chris Fenner!

tl:dr -> OS/OEMs don't want to, they could if they wanted to. But they don't want to increase security.

But please read the article :-)

So I'm out,

Categories: TPM

Six years of growth! Time to say "Thank you!", to you and the community!


today I will share with you some thoughts, insights, and statistics about LetsTrust-TPMs.

Let's start with the thoughts:

A "coincidence" led me into TPM Onchip development in 2016, where I met some TPM-addicted people, including one of my best friends today, Peter H.
Another "coincidence" introduced Peter to Max. Max, at that time, had become one of the first Approved Raspberry Pi resellers in the DACH region with and his shop

The path was short, and that's how I got to know Max. Thank you Peter!

The pitch was prepared, why Max should include my "prototype" in his shop... after a long preparation, the meeting took less than five minutes, and then it was already over. After that, we had a nice evening in his company :-D.

The Insights:

LetsTrust officially started on May 18, 2017, with the partnership between LetsTrust and and a batch of 100 LetsTrust-TPM units. It was my first product, and for Max, it was a unique selling point since he was the only one offering discrete TPMs for the Raspberry Pi.
My disappointment in the first weeks grew, and the sales figures were almost non-existent.
Anyway, after 18 months, a trend became apparent, and it slowly approached one unit per day.
Four years after the start, the sales figures settled at around 300 units per quarter. (Yeah!)

Then came the chip crisis, impacting the availability of Raspberry Pis and, consequently, the sales of LT-TPM. The subsequent pandemic, which partly fueled the chip crisis, didn't help growth, but there wasn't a significant downturn either.

What I'm proud of: Through good foresight planning, we could consistently deliver from the first day of sales until today.

Raspberry Pis are available again, and this is noticeably boosting LT-TPM sales. Through this continuous growth, I could develop additional hardware, including:
- a ComputeModule3 board with USB/Ethernet/CAN/RS485/RS232/HDMI/TPM
- the first Raspberry Pi Breakoutboard for the BME688
- a Breakoutboard for an excellent CO2 sensor (stable CO2 measure for more than 5 years!)
- and of course, the LetsTrust-TPM2Go.
- Several more designs are in progress (so much to prototype, route and test).

And all of this started with a TPM on a small board.

However, it grew and became significant only through you and the community.

At this point, Dimitar Tomov should also be mentioned; he is the founder of and undoubtedly contributed to LetsTrust's visibility.

Now, a few numbers and statistics!

Max kindly provided some anonymized data for this post.

A World Map!

LetsTrust-TPMs have been shipped directly from Germany to 38 countries. Australia, Chile, and Japan seem to be the farthest distances covered. This list is derived from direct sales; if your country is missing, you probably ordered through a distributor.

Growth and Quantity Graph!

The blue graph shows that despite the pandemic and chip crisis, we managed to maintain annual sales at a good level. The orange graph looks quite similar to the hype cycle ^_^, so fingers crossed as it seems to be on an upward trend now!

I can tell you: You don't get rich with this project (at least not yet), but I have fun, and my wife occasionally gets flowers and you get sometimes new hardware designs.

See you soon!

Categories: TPM

Raspberry 5 and LetsTrust-TPM compatible

Hello Everybody,

Now it is proven!
Raspberry Pi 5 can also handle the LetsTrust-TPM Module!

You will need a stacked header to connect a LetsTrust-TPM Module on a Raspberry Pi 5 with a heatsink!

Bye for now!

Categories: TPM

Getting Started with the LetsTrust-TPM2Go

Hello Everybody,

here is the short and simple starting guide for the new LetsTrust-TPM2Go USB Stick, (LTT2Go).

1. As before: You need the Hardware itself, actually buyable here:
(The list will be updated with every new distributor that we can find)

2. Installation of the TSS and the TCTI-device driver
The simple way to archive a running stack with functional LTT2Go is to install the TSS. Like the LetsTrust-TPM for Raspberry Pi, you could easily use the from
This script installs all necessary dependencies for the TSS and the tcti-driver for the LTT2Go, also the abrmd and the tpm2-tools will be installed.

3. Test the function of the LTT2Go:

Follow this short guide and your LTT2Go should working!

4. Reset the LetsTrust-TPM2Go Here you'll find a short CLI tool to reset the TPM Chip on the LTT2Go. Use this tool for reboots of the host system or during the development phase. Normally there is no reason to reset a TPM while it is booted up.

That was everything for the short starting guide, and probably also for a long version '^__^.

Bye for now!

Categories: TPM

More Hardware: LetsTrust-TPM2Go

2023 August 8th,

Finally shipped to the stock \o/.

I hope, you will find this USB-Stick useful for your development!



2023 August 2nd,

Shipment will start next week! \o/

Hello and welcome back,

Today, I would like to introduce my new product: LetsTrust-TPM2Go!

LetsTrust-TPM2Go is a USB 2.0 stick with a built-in TPM. It is designed to be compatible with Linux PCs or single-board computers that have USB-A ports (probably macOS but I could not test it). This product's main purpose is to simplify application development with TPM support. It can also be used if your embedded device is not ready or only has free USB ports on your target device.

Windows 11: LetsTrust-TPM2Go USB Stick is NOT compatible with Microsoft Windows 11 TPM 2.0 requirement!
Windows 10: LetsTrust-TPM2Go is not compatible [1].

- Infineon Optiga™ SLB 9672 TPM 2.0 FW15.23
- TCG Spec 2.0 Rev. 01.51
- USB 2.0 to SPI Bridge based on CY7C65211A
- Compatible with libusb
- Own USB VendorID/ProductID
- Tested with
- available TCTI-Driver in tpm2_tss for plug & play usage [2]
- 2 LEDs, one for "USB-RX/TX action" and one connected to a TPM-GPIO for user feedback
- Transparent ABS housing for the PCB
- LetsTrust-TPM2Go was designed, manufactured, and tested in Bavaria, Germany.

Preorders are now open, and you can find LetsTrust-TPM2Go here:

With the promo code TPMDEV2023, you'll get a 7€ discount on the first stick. This code is active till the end of August.

The first batch is manufactured, updated and tested.

The estimated shipment date is the end of July/beginning of August at the latest.
(We are waiting for the updated Vendor ID list on, as this final lists Pi3g as a vendor with the given number, I could finalise the sticks (I want to avoid to scrapping several 1000€s for a potential typo)) updated the list:

Shipment will start next week! \o/

Bye for now!


[1] I could interact with these sticks over WSL2 on Windows 10, but without a d-bus and the abrmd only simple commands are functional :-).


Continue reading "More Hardware: LetsTrust-TPM2Go "
Categories: TPM mini conf 2022

Hello and welcome back,

I'm really happy to announce the 2022 MiniConf 13. October this year!

You have to register here to get the conference link!

The schedule:

7:00 am Pacific Time / 4:00 pm CEST
The latest and greatest from OPTIGA™️ TPM, SLB9672 and SLB9673, Andreas Fuchs and Paul Kissinger from Infineon Technologies
7:30 am Pacific Time / 4:30 pm CEST
Disk integrity using microkernels and TPM, Sid Hussmann, CTO of Gapfruit, and Stefan Thöni
8:30 am Pacific Time / 5:30 pm CEST
Remote enrollment using sealed keys for Remote Attestation Ernesto Gomez Marin, Researcher at Infineon
9:30 am Pacific Time / 6:30 pm CEST
Remote Attestation of the UEFI Event log using Keylime, Thore Sommer, maintainer of Keylime
10:30 am Pacific Time / 7:30 pm CEST
Maintaining anchors of trust, Michael Richardson known from his RATS work at IETF and other workgroups
11:30 am Pacific Time / 8:30 pm CEST
How OpenSecurityTraining2 will help spread TPM and Trusted Computing awareness, Xeno Kovah, Founder of Open Security Training

I'll be there and you?

Bye for now!

Categories: TPM

New Project: EnactTrust

Hello and welcome back,

Dimitar from shared a new project:" EnactTrust, Attestation as a Service"

Dimitar allowed me to copy the article and share it with you :-)

The article was copied from, Author Dimitar Tomov,

Hello everyone,

Today, I want to share with our community something that a small group of us have built to help raise the adoption of some of TPM's advanced features:

Attestation as a Service

Mitko Vasilev who helped figure out the building blocks gives this overview:

EnactTrust is Remote Attestation as a Service for Linux and Windows systems with TPM chips.

You can use the TPM hardware root of trust for reporting to verify the integrity of any file or application on the system.

Svetlozar Kalchev who helped build our cloud infrastructure, backend, and frontend, is eager to welcome early adopters and asked me to share just this line:

We are excited to announce that signups for the EnactTrust beta are now open!

You can sign-up for our beta here.

Now, let's get down to the nitty-gritty details of how our beta works:

- Using our open-source agent app you can attest up to three nodes. The number of nodes can be unlimited. We are starting with up to three nodes just for the beta.
- EnactTrust agent app currently has two flavors - C and Golang.
- EnactTrust agent app generates Attestation Keys under the Owner Hierarchy of the TPM.
- EnactTrust agent app does not use the TPM's EK public key. We want to preserve the privacy of the user's TPM and user's node that will be attested because we expect most will first test on personal computers.
- EnactTrust backend for the public beta is cloud-based, although it could also be run on-premise. We want to offer something easy to try that does not depend on centralized servers. This is a major difference between EnactTrust and Microsoft AzureSphere or Intel's SGX.
- Every user has his own dashboard that is web-based. It is written in React.
- After you sign up for the beta, we will send you a unique user ID. Using this user ID you could log in to your EnactTrust dashboard.
- At the first launch of the EnacTrust agent on a new node, you have to enter your unique user ID and your node will be automatically added to your dashboard.
- Everyone who signups for our beta will be contacted when we launch EnactTrust.

I will pause with details for now and ask for feedback and questions. To join our beta sign-up here.


You could join the beta phase here:

I'll try EnactTrust on the Pi with one LetsTrust-TPM,

Bye for now!

Categories: TPM