Lee Duna@lemmy.nz to Technology@lemmy.worldEnglish · 11 months agoBitLocker encryption broken in less than 43 seconds with sub-$10 Raspberry Pi Pico — key can be sniffed when using an external TPMwww.tomshardware.comexternal-linkmessage-square68fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkBitLocker encryption broken in less than 43 seconds with sub-$10 Raspberry Pi Pico — key can be sniffed when using an external TPMwww.tomshardware.comLee Duna@lemmy.nz to Technology@lemmy.worldEnglish · 11 months agomessage-square68fedilink
minus-squarepeopleproblems@lemmy.worldlinkfedilinkEnglisharrow-up0·11 months agoVery end of the article explains you need access to the TPM communication hardware, which no longer occurs external to Intel and And cpus
minus-squareSpaceMan9000@lemmy.worldlinkfedilinkEnglisharrow-up0·11 months agoShould be noted that if a password is asked to decrypt the drive it also doesn’t work.
minus-squaremassive_bereavement@kbin.sociallinkfedilinkarrow-up0·11 months agoTo *newer Intel and AMD cpus and only certain models. There’s a lot of current hardware that uses embedded TPMs. It also depends on the communication path between the CPU and the module, but chances are it will be clear text and in some, via LPC.
minus-squareRooter@lemmy.worldlinkfedilinkEnglisharrow-up0·11 months ago*pretty much all AMD and Intel cpus made after 2015, not sure how a decade is new.
minus-squareamenotef@lemmy.worldlinkfedilinkEnglisharrow-up0·edit-211 months agoSo offline (external) bitlocker drives that are unlocked with the key only. Or internal bitlocker drives that are unlocked with AMD fTPM are excluded from this exploit?
Very end of the article explains you need access to the TPM communication hardware, which no longer occurs external to Intel and And cpus
Should be noted that if a password is asked to decrypt the drive it also doesn’t work.
To *newer Intel and AMD cpus and only certain models.
There’s a lot of current hardware that uses embedded TPMs. It also depends on the communication path between the CPU and the module, but chances are it will be clear text and in some, via LPC.
*pretty much all AMD and Intel cpus made after 2015, not sure how a decade is new.
So offline (external) bitlocker drives that are unlocked with the key only.
Or internal bitlocker drives that are unlocked with AMD fTPM are excluded from this exploit?