Danny101
Posts: 2,035 +842
Trusted platform module security defeated in 30 minutes, no soldering required
Sometimes, locking down a laptop with the latest defenses isn't enough.
arstechnica.com
I think so as well on the first count. They had physical access so that at least helps in that it lessens the risks.So, TPM is, at its core, just an excuse for M$ to be in league with manufacturers to sell a sh!tload of new hardware.
Although I think the article did state that the hacker had to be in contact with the machine for those 30 minutes?
Let's not exaggerate. The way they extracted the key is not easy at all for a regular Joe.So, TPM is, at its core, just an excuse for M$ to be in league with manufacturers to sell a sh!tload of new hardware.
Although I think the article did state that the hacker had to be in contact with the machine for those 30 minutes?
I'm no the one who was exaggerating/. I called "hacker", "half Hour", and, "physical contact". I freely admit it's beyond my abilities. Besides, you know I"m only here for the laughs.Let's not exaggerate. The way they extracted the key is not easy at all for a regular Joe.
I have only one computer that has, attestation - ready & storage - ready.Let's not exaggerate. The way they extracted the key is not easy at all for a regular Joe.