Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: null and void

The problem is that the TPM requires a password to access it. If the password isn’t entered, the TPM disallows access. And as a matter of fact, the default setting for most TPMs for excessive wrong passwords is to completely lock down the TPM until it’s administratively cleared from the BIOS.

The only way to snoop the TPM is to interrupt the tunnel after it’s been opened by the user, but just like with VPN, any interruption to the tunnel means the tunnel collapses.


94 posted on 08/22/2013 10:12:52 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 92 | View Replies ]


To: rarestia

Where does the password come from? Why can’t it be intercepted and stored at start up, then reused to open the tunnel at shutdown, read and save the TPM, and quietly disappear?


98 posted on 08/22/2013 10:16:25 AM PDT by null and void (Frequent terrorist attacks OR endless government snooping and oppression? We can have both!)
[ Post Reply | Private Reply | To 94 | View Replies ]

To: rarestia

[ the default setting for most TPMs for excessive wrong passwords is to completely lock down the TPM until it’s administratively cleared from the BIOS.]

And in some cases...

“If the manufacturer of your computer has already placed a certificate in the TPM, and that certificate has expired, then when Windows 8 activates the TPM, your computer’s motherboard will brick itself.”
http://www.kubuntuforums.net/showthread.php?58236-Windows-8-and-TPM-a-frustrating-tale-of-astonishing-stupidity

Oops.


170 posted on 08/22/2013 9:01:34 PM PDT by TArcher ("TO SECURE THESE RIGHTS, governments are instituted among men" -- Does that still work?)
[ Post Reply | Private Reply | To 94 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson