It should be noted that this attack was demonstrated on a nearly 10 year old laptop that has the TPM traces exposed on the motherboard.
Most TPMs nowadays are built into the CPU which does not leave them vulnerable to this type of attack.
This is a most excellent place for technology news and articles.
It should be noted that this attack was demonstrated on a nearly 10 year old laptop that has the TPM traces exposed on the motherboard.
Most TPMs nowadays are built into the CPU which does not leave them vulnerable to this type of attack.
Too late, Canada's banned Raspberry Pi's already. :(
I don't get the downvoting. This is solid commentary on the Flipper Zero idiocy.
Prolly from people who don’t yet know about the Flipper Canada bullshit hahaha
Its definitely sort or misleading but MS needs to really have its feet held to the fire when it comes to these things. It sort of pushes the narrative in the correct direction which is towards privacy AND security, not a half-ass balance where one or the other or both is compromised or is an illusion altogether
The Outlook stuff has demonstrated how fundamentally irresponsible and unserious they are about their obligation to secure and regulate their own systems, they need all the bad press they can get so they are compelled to do betwr
Because MS designed Lenovo motherboard for them and told them where to put the tpm debug pins? I think you're casting blame at the wrong vendor here.
Doesn't matter how good the software is if the hardware vendor fucks up like that.
Fake news. Nobody is getting a raspberry pi for $10 lol
I get your joke, but it's even cheaper than a "Raspberry Pi". Pi Pico, one RP2040 chip, that's basically RPi's new version of a Teensy. I just installed one in my GameCube to defeat its "BIOS" and boot from micro SD card :P
I just installed one in my GameCube to defeat its "BIOS" and boot from micro SD card :P
Coolest thing I heard all day. Didn't know that was a thing.
With shipping it's more than ten but on it's own it's 6,10 for the H model
Yet another example of "hardware access is root access"
$10.. not really in video. He had a custom PCB made so the pogo pins were on the board, all in one.
Honestly, pretty awesome. Although as noted, this is for older boards without TPM integration in CPU.
It can also be done with a logic analyzer.
The pi is $10. The rest is much more.
That is a PI Nano. They gave them away for free at a trade fair. I've got a bag of them laying around for my next project.
Pi Pico. With a RP2040 MCU. Which retails for [$9.91 on Amazon](Seeed Studio Raspberry Pi Pico Flexible Microcontroller Board Based on The Raspberry Pi RP2040 Dual-core ARM Cortex M0+ Processor for Gamecube, 1pc. https://a.co/d/0A0hAXX).
I’m sure they were giving away at some events because we’re trying to popularize the new chip to get more devs to jump on board. I use a RP2040 on my current project and it’s a great chip.
What does that have to do with the GameCube?
I’m not quite sure what you’re asking but I believe you are talking about PicoBoot, which is a way to hack your GameCube using a Raspberry Pi Pico RP2040.
https://hackaday.com/2022/07/05/raspberry-pi-pico-modchip-unlocks-the-gamecube/
And
https://github.com/webhdx/PicoBoot
Edit: I just realized the Amazon sale says GameCube. Makes sense now.
Just your standard Amazon SEO product name.
Pis are 10$ again? That's the real story.
It's a Pi Pico (RP2040), which is an MCU, not CPU. Similar to an Arduino UNO (ATmega328p).
With hardware access, yes. Not remotely.
Isn't the whole point of BitLocker protection from direct access? When a computer is turned off, encryption should keep the data safe. Also when a computer is turned off, basically no remote vector is going to work. AFAIK, when the computer is on, the drive is mounted and BitLocker provides no additional protection over an unencrypted drive.
Yes, you're correct. It's just that if somebody is got full access to your hardware, with no time limits and can just poke around your pcb, BitLocker is the least of your concerns. It should still not be flawed - but at that point, even Samsung's Knox, Qualcomm's memory protection and Apple's Secure Enclave have failed in the past, allowing the tinkerer to extract decryption keys.
It's more realistic to expect BitLocker to protect your external hard drive in case I grab it and run away, rather than expecting your computer to be bullet proof in case I aprehend the entire device.
But again, I do agree, this is a vulnerability and it's an issue, though limited to people using an actual TPM module rather than the built in one in the CPU.
Veracrypt drive encryption does not have the same problem, it would be secure even with physical access
I don't think a Veracrypt setup could use a hardware pairing for the decryption key, and also boot from an encrypted drive, though.
Correct. However, if you have a way to run a PowerShell command as an administrator, you can run a single cmdlet to get access to the bitlocker recovery key.
The concept and implementation of TPM use has been a joke since inception.
veracrypt or luks; bitlocker is a total joke.
Unsurprised. Physical security seems to be a lot tougher for the industry to “nail”
Just look at this UEFI boot fail vuln/exploit. Crazy.
Yet we still can't crack Denuvo...
Hey - hey member that time when Truecrypt was like, “Peace, we out. Use bitlocker. lol”
When’s the new Truecrypt coming out? Yeah yeah Veracrypt, I know. It’s cool, its just not. I dunno.