Anyway, if you rely on BitLocker in TPM mode (boot without PIN), you should know that anyone can steal your computer, sniff 32 bytes off of the LPC bus, stick them into libbde, and decrypt your disk. Yes, it's that easy. Solder 7 wires to $favorite_fpga_board, decrypt drive.
-
-
Let me get this straight, you're telling me it's a bad thing that I have all these signed EFI blobs that can be made to run automatically during the boot process and patch my OS after decryption? Idk man, sounds fake.
- Show replies
New conversation -
-
-
Yeah secure boot makes a lot more sense if you use TEE, like ARM's TrustZone (where all the crypto is done), while on x86 it doesn't really give any concrete security guarantees. Just the most basic protection against rootkits, etc.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

