For instance, it will analyze the BIOS, the MBR, etc., and make a record of that state. Anything stored on an unencrypted drive such as encryption keys will be recoverable by an attacker, and they can then use that key to unlock anything you previously protected with those keys.)Īfter the user initializes the TPM chip through the operating system, the TPM chip analyzes certain pre-boot environment conditions. (If you do not have physical possession of the machine, you will not be using transparent operation or "auto-unlock" mode. This chip stores the key used for encryption using AES with a 128-bit or 256-bit key. This chip is soldered to the motherboard and cannot be removed. In the "transparent operation mode" like you're talking about, the computer will be using a TPM (trusted platform module) chip. It's FIPS 140-2 compliant and there have not been any sort of backdoors discovered in it (to the consternation of certain law-enforcement agencies, who want backdoors into your data.) I highly recommend it.īut is it hack-proof? Nah, of course not.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |