Two security flaws in the TPM 2.0 specs put cryptographic keys at risk

I'll bet the clowns at M$ now double down on TPM BS requirements for Windows 11 and somehow spin this as why they were right.
 
Even with adequate testing TPM 3.0 will be vulnerable

TPM 3.0 will be closed source and backdoored by design

There is currently a public attack on open source (in the media) because it is being targeted for exploits

This is a false narrative!

Open source lets you find who the guilty party is
Closed source harbors these fugitives from public outrage and justice

Fact checks Welcomed!
It's both.

The only thing ordinary people can feel secure about is that everything they're using is compromised. It starts with the chips.
 
And then someone will find a security hole in TPM 3.0 because it was rushed into service without adequate testing.
And because TPM 3.0 was built into the CPU, motherboard, GPU, and SSD, this will necessitate a new computer and operating system! $$$$Win!

Oh, yeah, for MS and the hardware makers. Not for you though. Details...
 
Maybe this will make MS remove the TPM 2.0 requirement for Windows 11 and bump the marketshare because why not

No, M$ will make the only source of software for Windows 11/12 and beyond their store. It's pretty much what every other OS does. iOs, Android, even the majority of Linux distros use a repository (store) by default. It's why IMHO using TPM 2.0 was a requirement of Win11. Using remote attestation Windows can whitelist software sources, in fact they've already tested this. Problem is it locks users into the M$ store by default, with jailbreaking a device and invalidating warranties the only way to get around it. It's why since Windows 8 M$ has been trying so hard to break into the mobile market. Those stores are massive revenue generators for Apple and Google.

It's all there in the TPM specifications:
https://en.wikipedia.org/wiki/Trusted_Computing
 
Back