Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: null and void

The channel used to transmit the password to the TPM authenticator is the same secure channel used for communications. Direct interception isn’t possible. They could use a keylogger, but then there are larger security problems if someone has a keylogger on their system.

Also, the TPM is enabled and active during the entirety of the session. Accessing the TPM while the system is offline is not possible. Accessing the TPM while the system is asleep is technically possible, but the channels to get to the TPM on an S3 motherboard are not usually open.

TPM stands for Trusted Platform Module for a reason. It’s intended to act as a non-repudiation and platform authenticity modality. If two-factor authentication is used in your environment (i.e. cert and password), this is just another form of authentication of a platform on a network or system.


105 posted on 08/22/2013 10:25:54 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 98 | View Replies ]


To: rarestia
I'm talking about an evanescent ghost session. A session that starts, reads the TPM through whatever artifice, then shuts down and allows the system to start the real session.

A lot can happen in a tenth of a second on a 1 GHz processor.

The user would never notice that the start-up was a bit slow this one time.

Better, do it at a shutdown where winders is installing updates. No one ever knows how long that's going to take!

109 posted on 08/22/2013 10:33:58 AM PDT by null and void (Frequent terrorist attacks OR endless government snooping and oppression? We can have both!)
[ Post Reply | Private Reply | To 105 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson