If you open your computer's case, it is already vulnerable to hacking, because no consumer x86 computer is secure under that threat model. Yes, this is another bullshit hyped attack with minimal practical consequence because under their threat model you are already pwned.https://twitter.com/WIRED/status/1259669698494509056 …
-
Show this thread
-
Replying to @marcan42
I do wish there was something you could do. I'm working on a project that involves shipping a server-as-an-appliance to a not very US contract/ip law favorable country. The best I could manage was tying the disk encryption to the TPM with a half dozen PCRs.
1 reply 0 retweets 0 likes -
Replying to @matt_sieker @marcan42
I fully warned my client up front this would just stop "casual" attacks. I have no clue if you can read they key off the bus during TPM unlocking. And I'm sure it's in ram somewhere that you could grab with a fast enough scope.
2 replies 0 retweets 0 likes -
Replying to @matt_sieker
You can. I've implemented that attack. The only way that works is physical security, i.e. a mesh and antitampering, and fast reaction to intrusions (e.g. wiping keys permanently, held in SRAM).
1 reply 0 retweets 0 likes -
Replying to @marcan42
I know the chassis has an intrusion switch, but I couldn't make heads or tails if it actually affected any PCRs before the drop dead date to ship hardware. Plus the attackers could be state-level, which I flat out stated "people smarter than me can't manage to defend against that
2 replies 0 retweets 1 like
Yeah, you're basically SOL at that point without a massively hardened device.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.