Anyway, if you rely on BitLocker in TPM mode (boot without PIN), you should know that anyone can steal your computer, sniff 32 bytes off of the LPC bus, stick them into libbde, and decrypt your disk. Yes, it's that easy. Solder 7 wires to $favorite_fpga_board, decrypt drive.
-
Show this thread
-
Replying to @marcan42 @gentilkiwi
I might be able to find some time to publish the tools and methods I used based on a standard logic analyzer (no fpga). Would anyone find that useful/interesting?
3 replies 0 retweets 7 likes
Replying to @mtth_bfft @gentilkiwi
I was using my FPGA as a logic analyzer (literally just dumping out LPC bus cycles as bytes, 5 bits per sample, LFRAME + LAD[0:3]), 180 of lines of C to parse that into LPC transactions, and 30 lines of Python to parse those into TPM messages. It's all pretty trivial.
0 replies
1 retweet
6 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.