Anyway, if you rely on BitLocker in TPM mode (boot without PIN), you should know that anyone can steal your computer, sniff 32 bytes off of the LPC bus, stick them into libbde, and decrypt your disk. Yes, it's that easy. Solder 7 wires to $favorite_fpga_board, decrypt drive.
Um, how? TPMs aren't HSMs, they are not battery-backed. How is the laptop going to detect a chassis intrusion without power? Using the CMOS battery? And then what, powering up the TPM and somehow issuing a wipe command all from that 3V cell? This all sounds implausible.
-
-
Some TPM chips keep enough stored charge to act on chassis intrusion and wipe themselves
-
This Tweet is unavailable.
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.