> From: Vitaly Zaitsev via devel [mailto:[email protected]] > Sent: Thursday, December 30, 2021 12:18 PM > On 29/12/2021 15:20, Roberto Sassu via devel wrote: > > The TPM has a fundamental advantage, compared to other > > mechanisms. It is tamperproof, it often receives high-grade > > certifications, and it is one of the few components that you > > could rely on to protect your sensitive data in the event your > > host becomes compromised. > > https://arstechnica.com/gadgets/2021/08/how-to-go-from-stolen-pc-to- > network-intrusion-in-30-minutes/
If I understood the article correctly, the communication was spoofed due to not using the encrypted session feature of the TPM. The TPM also supports protection against tampering of the communication with the HMAC session. Roberto HUAWEI TECHNOLOGIES Duesseldorf GmbH, HRB 56063 Managing Director: Li Peng, Zhong Ronghua _______________________________________________ devel mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/[email protected] Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
