• Truscape@lemmy.blahaj.zone
    link
    fedilink
    arrow-up
    48
    arrow-down
    1
    ·
    edit-2
    8 days ago

    The TPM 2.0 implementation (mandated by Microsoft) is flawed. That much is certain.

    If you’d like to know more details about the “benefits” and vulnerabilities of the standard, feel free to read the relevant wikipedia article: https://en.wikipedia.org/wiki/Trusted_Platform_Module

    In my personal opinion, the TPM as a whole seems like a “solution in search of a problem”, and developments that were able to foil its protection as early as 2010 from state and non-state actors should be a massive red flag.

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      4
      ·
      edit-2
      6 days ago

      Physical security is very hard

      TPM is a useful to help ensure physical security. TPM isn’t perfect but it is decent for what it is.

      • eleitl@lemmy.zip
        link
        fedilink
        arrow-up
        5
        ·
        6 days ago

        That assumes you can trust the unauditable. I can only accept open hardware, with verification of random samples.