• andyburke
    arrow-up
    2
    arrow-down
    0
    ·
    6 months ago
    link
    fedilink

    Or, if I can extract that key from the hardware, I can pretend to be that hardware whenever I want, right?

    • Dark ArcEnglish
      arrow-up
      1
      arrow-down
      0
      ·
      6 months ago
      link
      fedilink

      Hmmm I was going to say no because it’s asymmetric crypto, but you’re right if you are somehow able to extract the signed private key, you can still lie Good point

      • yggstyleEnglish
        arrow-up
        2
        arrow-down
        0
        ·
        6 months ago
        link
        fedilink

        Got some bad news. They already can do that. It’s a very low effort attack too. Current TPM spits its key out in clear text. Funny right?