TPM (Trusted Platform Module) - Computerphile

TPM (Trusted Platform Module) - Computerphile

Computerphile

2 года назад

216,574 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@Be4givN
@Be4givN - 22.12.2023 23:00

Can TPM prevent installing a Entire Machine Backup from iDrive to the same computer?

Ответить
@KarunaMurti
@KarunaMurti - 20.12.2023 17:50

Sweet, now off to buy TPM chip from Aliexpress.

Ответить
@ronaldprovencher7570
@ronaldprovencher7570 - 24.10.2023 04:01

msi 990fxa-gd65 n1996 use's what TMP module dose it take ????

Ответить
@crazycrazy7710
@crazycrazy7710 - 22.10.2023 11:35

In the time where companies push for Zero-Trust environment, them pushing for TPM sounds weird.

Ответить
@FranciscoSilva84
@FranciscoSilva84 - 03.10.2023 21:57

Very well explained thank

Ответить
@jacobscrackers98
@jacobscrackers98 - 21.08.2023 19:09

My question is: aren't we already trusting our OS not to sent your data off to a third party?
What's stopping a malicious OS from just using the TPM to do that?
I suppose the TPM could have a button physically connected to it that needs to be pressed before the chip does anything to ensure user consent. Like on mobile security keys or the Titan M on Pixels.
How many TPMs (particularly on consumer hardware) do that?

Ответить
@TwstedTV
@TwstedTV - 15.07.2023 02:45

This has me very concerned.
If a person installs a TPM chip onto their computer and their computer has 1-boot drive, 4 storage drives, 1PCIe USB expansion card, and a graphics card.
If ANY of those hardware changes after the TPM is installed on the system, the owner is completely locked out of their system because the system won't boot.
The TPM checks and makes sure that the same hardware configuration still exist every time the operating system boots and if it does not, then the owner is locked out of their system.
This is horrifying in many ways.
Lets say for example one of the 4 storage drives mentioned above dies or fails. The owner can not boot the system up because the (hardware) itself is not present.
It died or failed. So if a person purchases a new storage harddrive aka hardware and installs it in their system to replace the failed storage drive. The system will not boot.
Because the TPM will see that the system has a new hardware device that it does not recognize that has been added to the system. And the hardware does not match
of that of the original hardware that failed. Thus the TPM will prevent the system from booting at all locking out the owner of such computer.
This is a major problem.
Even if the owner does not have a failed hardware, lets say the owner wants to upgrade their motherboard to a newer version, that the owner has been saving up for.
Its the same brand, manufacturer and type of motherboard, just a newer more up to date version of it. The owner will not be able to boot their system because the TPM
has locked the owner out of the system because there was a hardware change. This is a major major major issue.
It has nothing to do with data stored on a drive as that is a completely different discussion. We are talking about hardware itself. TPM's protects hardware.
And it records the hardware state of the system when you first install and activate the TPM.
So while companies are pushing people to have a more secured system, it also comes with a barrel of nightmares. 🤷‍♀🤷‍♀🤷‍♀

Ответить
@FisheySauce
@FisheySauce - 15.06.2023 02:41

This man could either be 28 or 58, I have no idea which.

Ответить
@melangkoh4184
@melangkoh4184 - 25.05.2023 21:59

the problem is, we can all agree that Windows with each new Version takes more efforts and creates new ways to establish control and receive as much information as possible. Now i dont know how this TPM comes into play. but if they make it a requierement for Windows 11, i cant imagine that Microsoft suffers from helpers syndrom and wants to make life better for users.

Ответить
@Bowsar1337
@Bowsar1337 - 13.05.2023 16:49

yes, the point of trusted platform module is to make your computer more secure
from you

Ответить
@JurgenErhard
@JurgenErhard - 12.03.2023 11:59

Buffer Overflow Platform Module… ;-)

Ответить
@nathanbanks2354
@nathanbanks2354 - 05.03.2023 02:20

This answers my question: I should use a software TPM in case I want to move my Windows VM to a new computer.

Ответить
@sirprancealott2003
@sirprancealott2003 - 07.12.2022 04:23

Isn't it cheaper to just email your keys to GCHQ and save them the bother of opening the backdoor?

Ответить
@ringo3958
@ringo3958 - 13.11.2022 21:18

The number of times he said "it exists to make your more secure" made me understand that it's about all but keeping me secure. microsoft corporation*, *forces me to have this module because they care so much about my wellbeing. If dr bagley believes that he is either naive or bribed. my bet is on the latter

Ответить
@jeffreydilley3380
@jeffreydilley3380 - 28.10.2022 00:45

Does anyone have any resources for learning to code with TPM?

Ответить
@pafnutiytheartist
@pafnutiytheartist - 21.10.2022 17:55

"If you are cynical" - looking at what Microsoft has been up to last few years, yes, I am very cynical

Ответить
@priyapepsi
@priyapepsi - 18.09.2022 12:54

I love how nobody wanted TPM yet device manufacturers forced it onto us

Ответить
@michalbotor
@michalbotor - 10.09.2022 11:11

tpm vs crypto hardware wallet? seems very similar to me.

Ответить
@Valinior
@Valinior - 07.09.2022 02:34

Where i can find my tpm key?

Ответить
@meinbherpieg4723
@meinbherpieg4723 - 06.09.2022 16:33

TPM is how corporations impose their keys on our systems which we cannot view in order to protect information they want to keep secure, not necessarily for our benefit.

Ответить
@LeoTheGamer500
@LeoTheGamer500 - 10.06.2022 19:09

tpm lop jam
1153 comments

Ответить
@LeoTheGamer500
@LeoTheGamer500 - 10.06.2022 19:08

tpm s sounds lake

Ответить
@somerandomnullpointer6458
@somerandomnullpointer6458 - 26.05.2022 03:24

Still this topic is not easy to understand without diving more into the technical details.

Ответить
@tvrtkokotromanic8391
@tvrtkokotromanic8391 - 15.05.2022 04:09

Is there a version of windows for us who are not spies or criminals and who do not hide anything on the computer,something like facebook where everyone can look.

Ответить
@mcgough1088
@mcgough1088 - 13.05.2022 17:23

What does TPM stand for?

Ответить
@charr6108
@charr6108 - 08.05.2022 04:09

Microsoft is adopting a ransomware technology now

Ответить
@Autotrope
@Autotrope - 27.04.2022 01:55

If you go back to the early example of the software or OS kernel being compromised from the start, isn't this still an avenue by which an attacker can get the key? It seems from the description that the TPM protects against other systems or other OSes accessing it, not the same system which is compromised?

Ответить
@krzysztofklis
@krzysztofklis - 21.02.2022 00:45

Let's be honest, TPM will be used primarily by Microsoft as a copy protection. That's why this chip is required in order to run Windows 11.

Ответить
@theylive5575
@theylive5575 - 08.02.2022 03:31

1984 module

Ответить
@bellagiosampler7390
@bellagiosampler7390 - 26.01.2022 09:19

Great explanation

Ответить
@danirving
@danirving - 26.01.2022 04:22

How do you think this impacts data recovery?

Ответить
@danielgrace7408
@danielgrace7408 - 18.01.2022 08:34

I want to upgrade my m.2 on my laptop but I believe the TPM stops me from running windows on my new m.2 with fresh OS install.

Ответить
@GBlunted
@GBlunted - 16.01.2022 18:05

I like that my phone uses fingerprint with the TPM to do it's thing...

Ответить
@darkoneyoutube9815
@darkoneyoutube9815 - 14.01.2022 02:30

TPM is unique per computer. meaning in the future they will use it to 100% fingerprint your machine no matter what vpn or solution you are using to hide your true identitiy

Ответить
@peterpeterson4800
@peterpeterson4800 - 11.01.2022 09:47

Some dodgy geezer called Mike and his special brew. xD

Ответить
@Cookiekeks
@Cookiekeks - 10.01.2022 19:28

Why do you need to have the key stored on the pc?

Ответить
@BD90..
@BD90.. - 27.12.2021 07:20

Eventually the hardware that the TPM uses needs to be improved. This was one of those cases. TPM version 2

Ответить
@kimtruong4676
@kimtruong4676 - 26.12.2021 01:45

So difficult to follow along to talk without a diagram. Is there a version of this speech with daigrams?

Ответить
@matthewrease2376
@matthewrease2376 - 24.12.2021 22:05

Just another reason to not use Windows.

Ответить
@ClassifiedPerson
@ClassifiedPerson - 24.12.2021 06:50

TPM : bla bla bla bla bla

Ответить
@HatelivesNextDoor
@HatelivesNextDoor - 23.12.2021 07:05

It would be super easy to destroy the entire concept of cryptocurrency with this implementation. Restricting access to people who arent as technologically proficient would destroy its usability.

Ответить
@HatelivesNextDoor
@HatelivesNextDoor - 23.12.2021 07:04

People so concerned about compromising the computer the TPM is running on. It would be difficult to protect EVERYTHING else in your house that is on a network with or has been on a network with the compromised PC. Skynet.

Ответить
@edgeGabe
@edgeGabe - 21.12.2021 08:01

Sounds like something that would be required more in business or school computers. Stop new employee's that are highly skilled in IT getting info that can damage the company.

Ответить
@SolarDrew
@SolarDrew - 20.12.2021 21:54

Tweeb 2.0

Ответить
@ltonetto
@ltonetto - 17.12.2021 14:50

video sponsored by Coke

Ответить
@arlequin241
@arlequin241 - 06.12.2021 14:21

NSA has a copy of this back-door key 🔑

Ответить
@seeranos
@seeranos - 30.11.2021 19:44

Can’t wait for a Microsoft manufacturer to get hacked and the TPM keys to get released in an unsalted csv

Ответить