trusted computing base — высоконадёжная вычислительная база TPM-based keys can be configured rein a variety of ways. One option is to make a TPM-based key unavailable outside the TPM. This is good to mitigate phishing attacks because it prevents the key from being copied and used without the TPM. The i