Anyway, if you rely on BitLocker in TPM mode (boot without PIN), you should know that anyone can steal your computer, sniff 32 bytes off of the LPC bus, stick them into libbde, and decrypt your disk. Yes, it's that easy. Solder 7 wires to $favorite_fpga_board, decrypt drive.
-
-
I should really get in on this LPC fun. I've been meaning to do some stuff with SMBus sniffing on PCIe and DIMM slots for ages but LPC now seems like it would be more interesting.
-
It's just 33MHz, it's slow as heck by modern standards.
End of conversation
New conversation -
-
-
Platforms with plugged modules are expected to be in a secure environment. If you care about theft of your vault, install a better lock cylinder, lock it and don't put the key underneath the doormat.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
It's why TALOS2 got a point-to-point LPC bus (and why several laptops clear TPM when opened up)
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I found that if you make the fan do a failure, the machine stops. Then if you boot the box again, it asks for bitlocker recovery key, if you skip and reboot, the box unlocks after a fan check too.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Fun fact: Several outsourced Lenovo laptops (especially 2013-2016 era) also bring the LPC header out onto otherwise unused pins of the wlan minipcie port, so you don't even need to take the machine apart.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.