TPM 2.0 is actually cool

(apas.tel)

2 points | by art049 8 hours ago ago

2 comments

  • hyperman1 4 hours ago

    It is indeed cool tech. But be aware that e.g. building weapons is also playing with cool tech.

    The main problem I see: Who is the attacker and who is the defender. The presented scenario has the machine owner (renter?) as defender, so no problem. In quite a lot of cases, the machine owner is the attacker, and e.g. Microsoft is the defender. That's where things get nasty.

  • p_ing 8 hours ago

    It sucks, until I understood what it was -Author

    > Every modern motherboard ships with a tiny cryptoprocessor

    The majority of implementations for quite a few years now are fTPM, that is TPM on the CPU package rather than the motherboard.