Anyway, if you rely on BitLocker in TPM mode (boot without PIN), you should know that anyone can steal your computer, sniff 32 bytes off of the LPC bus, stick them into libbde, and decrypt your disk. Yes, it's that easy. Solder 7 wires to $favorite_fpga_board, decrypt drive.
-
-
I see what you mean. At least the relevant code is open source.
-
It isn't. The Qualcomm bootloaders aren't open source and are in the critical path; also the *other* thing they put into TrustZone is DRM blob nonsense (Widevine) and *that* is also exploitable (and then you can escalate). See e.g. https://googleprojectzero.blogspot.com/2017/07/trust-issues-exploiting-trustzone-tees.html …
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.