Комментарии:
Can TPM prevent installing a Entire Machine Backup from iDrive to the same computer?
ОтветитьSweet, now off to buy TPM chip from Aliexpress.
Ответитьmsi 990fxa-gd65 n1996 use's what TMP module dose it take ????
ОтветитьIn the time where companies push for Zero-Trust environment, them pushing for TPM sounds weird.
ОтветитьVery well explained thank
ОтветитьMy question is: aren't we already trusting our OS not to sent your data off to a third party?
What's stopping a malicious OS from just using the TPM to do that?
I suppose the TPM could have a button physically connected to it that needs to be pressed before the chip does anything to ensure user consent. Like on mobile security keys or the Titan M on Pixels.
How many TPMs (particularly on consumer hardware) do that?
This has me very concerned.
If a person installs a TPM chip onto their computer and their computer has 1-boot drive, 4 storage drives, 1PCIe USB expansion card, and a graphics card.
If ANY of those hardware changes after the TPM is installed on the system, the owner is completely locked out of their system because the system won't boot.
The TPM checks and makes sure that the same hardware configuration still exist every time the operating system boots and if it does not, then the owner is locked out of their system.
This is horrifying in many ways.
Lets say for example one of the 4 storage drives mentioned above dies or fails. The owner can not boot the system up because the (hardware) itself is not present.
It died or failed. So if a person purchases a new storage harddrive aka hardware and installs it in their system to replace the failed storage drive. The system will not boot.
Because the TPM will see that the system has a new hardware device that it does not recognize that has been added to the system. And the hardware does not match
of that of the original hardware that failed. Thus the TPM will prevent the system from booting at all locking out the owner of such computer.
This is a major problem.
Even if the owner does not have a failed hardware, lets say the owner wants to upgrade their motherboard to a newer version, that the owner has been saving up for.
Its the same brand, manufacturer and type of motherboard, just a newer more up to date version of it. The owner will not be able to boot their system because the TPM
has locked the owner out of the system because there was a hardware change. This is a major major major issue.
It has nothing to do with data stored on a drive as that is a completely different discussion. We are talking about hardware itself. TPM's protects hardware.
And it records the hardware state of the system when you first install and activate the TPM.
So while companies are pushing people to have a more secured system, it also comes with a barrel of nightmares. 🤷♀🤷♀🤷♀
This man could either be 28 or 58, I have no idea which.
Ответитьthe problem is, we can all agree that Windows with each new Version takes more efforts and creates new ways to establish control and receive as much information as possible. Now i dont know how this TPM comes into play. but if they make it a requierement for Windows 11, i cant imagine that Microsoft suffers from helpers syndrom and wants to make life better for users.
Ответитьyes, the point of trusted platform module is to make your computer more secure
from you
Buffer Overflow Platform Module… ;-)
ОтветитьThis answers my question: I should use a software TPM in case I want to move my Windows VM to a new computer.
ОтветитьIsn't it cheaper to just email your keys to GCHQ and save them the bother of opening the backdoor?
ОтветитьThe number of times he said "it exists to make your more secure" made me understand that it's about all but keeping me secure. microsoft corporation*, *forces me to have this module because they care so much about my wellbeing. If dr bagley believes that he is either naive or bribed. my bet is on the latter
ОтветитьDoes anyone have any resources for learning to code with TPM?
Ответить"If you are cynical" - looking at what Microsoft has been up to last few years, yes, I am very cynical
ОтветитьI love how nobody wanted TPM yet device manufacturers forced it onto us
Ответитьtpm vs crypto hardware wallet? seems very similar to me.
ОтветитьWhere i can find my tpm key?
ОтветитьTPM is how corporations impose their keys on our systems which we cannot view in order to protect information they want to keep secure, not necessarily for our benefit.
Ответитьtpm lop jam
1153 comments
tpm s sounds lake
ОтветитьStill this topic is not easy to understand without diving more into the technical details.
ОтветитьIs there a version of windows for us who are not spies or criminals and who do not hide anything on the computer,something like facebook where everyone can look.
ОтветитьWhat does TPM stand for?
ОтветитьMicrosoft is adopting a ransomware technology now
ОтветитьIf you go back to the early example of the software or OS kernel being compromised from the start, isn't this still an avenue by which an attacker can get the key? It seems from the description that the TPM protects against other systems or other OSes accessing it, not the same system which is compromised?
ОтветитьLet's be honest, TPM will be used primarily by Microsoft as a copy protection. That's why this chip is required in order to run Windows 11.
Ответить1984 module
ОтветитьGreat explanation
ОтветитьHow do you think this impacts data recovery?
ОтветитьI want to upgrade my m.2 on my laptop but I believe the TPM stops me from running windows on my new m.2 with fresh OS install.
ОтветитьI like that my phone uses fingerprint with the TPM to do it's thing...
ОтветитьTPM is unique per computer. meaning in the future they will use it to 100% fingerprint your machine no matter what vpn or solution you are using to hide your true identitiy
ОтветитьSome dodgy geezer called Mike and his special brew. xD
ОтветитьWhy do you need to have the key stored on the pc?
ОтветитьEventually the hardware that the TPM uses needs to be improved. This was one of those cases. TPM version 2
ОтветитьSo difficult to follow along to talk without a diagram. Is there a version of this speech with daigrams?
ОтветитьJust another reason to not use Windows.
ОтветитьTPM : bla bla bla bla bla
ОтветитьIt would be super easy to destroy the entire concept of cryptocurrency with this implementation. Restricting access to people who arent as technologically proficient would destroy its usability.
ОтветитьPeople so concerned about compromising the computer the TPM is running on. It would be difficult to protect EVERYTHING else in your house that is on a network with or has been on a network with the compromised PC. Skynet.
ОтветитьSounds like something that would be required more in business or school computers. Stop new employee's that are highly skilled in IT getting info that can damage the company.
ОтветитьTweeb 2.0
Ответитьvideo sponsored by Coke
ОтветитьNSA has a copy of this back-door key 🔑
ОтветитьCan’t wait for a Microsoft manufacturer to get hacked and the TPM keys to get released in an unsalted csv
Ответить