So apparently it's 2019 and @Lenovodc *still* insists on having a broken in-warranty enterprise HDD returned (even though that would be a massive data protection violation) or else they charge for the replacement.
I am not amused.
They're just an added cost option. TPMs are basically useless for unattended boot because if you *really* want the key you just hook up a logic analyzer and sniff it out. I've done that with BitLocker.
-
-
So the threat model isn't much different from just having the key in a UEFI variable, against a skilled attacker. And the goal here isn't to protect against physical access attacks, it's just to keep the drives encrypted.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.