Anyway, if you rely on BitLocker in TPM mode (boot without PIN), you should know that anyone can steal your computer, sniff 32 bytes off of the LPC bus, stick them into libbde, and decrypt your disk. Yes, it's that easy. Solder 7 wires to $favorite_fpga_board, decrypt drive.
-
Show this thread
-
This is only after typing the bios boot password if you have one, correct?
1 reply 0 retweets 1 like -
Replying to @lgrangeia @morisson
BIOS boot passwords typically provide little security. If you're soldering wires to LPC to bypass BitLocker dumping the BIOS config and disabling the password is trivial.
1 reply 0 retweets 0 likes -
What about pre-boot fingerprint validation? I'm thinking about Thinkpads.
1 reply 0 retweets 0 likes
Replying to @lgrangeia @morisson
My educated guess is it also isn't secure, but I don't know the implementation details of how they do FP validation.
5:24 AM - 6 Jan 2019
0 replies
0 retweets
1 like
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.