Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. TPM Sucks

TPM Sucks

Scheduled Pinned Locked Moved The Lounge
csharpcomquestion
16 Posts 8 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • G Graham Bradshaw

    Ennis Ray Lynch, Jr. wrote:

    the secrets contained on your bit locker secured laptop

    Isn't putting data that sensitive on a laptop flawed anyway?

    E Offline
    E Offline
    Ennis Ray Lynch Jr
    wrote on last edited by
    #4

    The reality is that TPM is marketed as a way to protect sensitive data from theft. Most government agencies I have worked for make all their users use laptops so they can take their work home, leading of course to sensitive data off site. With the illusion of security TPM and bitlocker provides it is more likely that users, who often do not understand security, will make take the data off site. While my example is extreme it was used to illustrate a point, there are many more scenarios less extreme but still justifiable if some hacker ever provided the toolkit for a script kiddie to utilize.

    Need a C# Consultant? I'm available.
    Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway

    G 1 Reply Last reply
    0
    • E Ennis Ray Lynch Jr

      The reality is that TPM is marketed as a way to protect sensitive data from theft. Most government agencies I have worked for make all their users use laptops so they can take their work home, leading of course to sensitive data off site. With the illusion of security TPM and bitlocker provides it is more likely that users, who often do not understand security, will make take the data off site. While my example is extreme it was used to illustrate a point, there are many more scenarios less extreme but still justifiable if some hacker ever provided the toolkit for a script kiddie to utilize.

      Need a C# Consultant? I'm available.
      Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway

      G Offline
      G Offline
      Graham Bradshaw
      wrote on last edited by
      #5

      Ennis Ray Lynch, Jr. wrote:

      Most government agencies I have worked for make all their users use laptops so they can take their work home, leading of course to sensitive data off site.

      Surely an encrypted USB stick would be better? Cheaper, and much easier to keep on your person, and hence less likely to be stolen. Smaller, so much more likely to get lost, of course.

      E 1 Reply Last reply
      0
      • G Graham Bradshaw

        Ennis Ray Lynch, Jr. wrote:

        Most government agencies I have worked for make all their users use laptops so they can take their work home, leading of course to sensitive data off site.

        Surely an encrypted USB stick would be better? Cheaper, and much easier to keep on your person, and hence less likely to be stolen. Smaller, so much more likely to get lost, of course.

        E Offline
        E Offline
        El Corazon
        wrote on last edited by
        #6

        Graham Bradshaw wrote:

        Surely an encrypted USB stick would be better? Cheaper, and much easier to keep on your person, and hence less likely to be stolen. Smaller, so much more likely to get lost, of course.

        not allowed, only TPM encrypted folders on usb. You use another encryption scheme and you'll answer to the guys who can no longer read what you store there.... ;)

        _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb) John Andrew Holmes "It is well to remember that the entire universe, with one trifling exception, is composed of others."

        1 Reply Last reply
        0
        • E Ennis Ray Lynch Jr

          Talk about a flawed system. It works great in the scenario of laptop being stolen and protecting data but not much to protect a system from intentional data theft. Imagine the following scenario: China wants access to the secrets contained on your bit locker secured laptop with TPM. Attacker secretly snatches laptop and replaces with identical machine whose boot simulates TPM start-up stealing pin, start-up key and optionally keys on TPM. The original machine is now compromised. Blah.

          Need a C# Consultant? I'm available.
          Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway

          A Offline
          A Offline
          Anna Jayne Metcalfe
          wrote on last edited by
          #7

          I see a flaw, unless you are in the habit of carrying around pristine factory fresh laptops. I'd love to see them put together an "identical machine" to my laptop. The patterns of wear are pretty unmistakeable (e.g. the springs on the monitor clips have gone, along with some of the labels - others are faded). Worse, I've a habit of putting stickers on the thing, and I doubt they'd bother to do that... Paranoia can only take you so far, after all. :-\

          Anna :rose: Having a bad bug day? Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

          E P 2 Replies Last reply
          0
          • A Anna Jayne Metcalfe

            I see a flaw, unless you are in the habit of carrying around pristine factory fresh laptops. I'd love to see them put together an "identical machine" to my laptop. The patterns of wear are pretty unmistakeable (e.g. the springs on the monitor clips have gone, along with some of the labels - others are faded). Worse, I've a habit of putting stickers on the thing, and I doubt they'd bother to do that... Paranoia can only take you so far, after all. :-\

            Anna :rose: Having a bad bug day? Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

            E Offline
            E Offline
            Ennis Ray Lynch Jr
            wrote on last edited by
            #8

            Really, you have seen your laptops motherboard or any modern spy movie? A couple of screws is all it would take. As a practical matter it is a serious flaw that should not be pushed aside.

            Need a C# Consultant? I'm available.
            Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway

            A 1 Reply Last reply
            0
            • E Ennis Ray Lynch Jr

              Really, you have seen your laptops motherboard or any modern spy movie? A couple of screws is all it would take. As a practical matter it is a serious flaw that should not be pushed aside.

              Need a C# Consultant? I'm available.
              Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway

              A Offline
              A Offline
              Anna Jayne Metcalfe
              wrote on last edited by
              #9

              I take special care to only buy those laptops which spring apart in the most confusing manner when you try to dissemble them (ever try to reassemble a toaster? Clue: don't). Oh, and the thing is never out of my sight. That probably helps, too. As does the use of military grade encryption. ;P Seriously, the worst thing that will happen to 99% of people out there is that the machineis stolen. Unless you work on defence projects or handle financial information for banks a decent encryption policy is more than adequate in virtually all cases. Of course, if you carry restricted information on a laptop and leave it unattended, any consequences are your own fault, really.

              Anna :rose: Having a bad bug day? Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

              E 1 Reply Last reply
              0
              • A Anna Jayne Metcalfe

                I take special care to only buy those laptops which spring apart in the most confusing manner when you try to dissemble them (ever try to reassemble a toaster? Clue: don't). Oh, and the thing is never out of my sight. That probably helps, too. As does the use of military grade encryption. ;P Seriously, the worst thing that will happen to 99% of people out there is that the machineis stolen. Unless you work on defence projects or handle financial information for banks a decent encryption policy is more than adequate in virtually all cases. Of course, if you carry restricted information on a laptop and leave it unattended, any consequences are your own fault, really.

                Anna :rose: Having a bad bug day? Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

                E Offline
                E Offline
                Ennis Ray Lynch Jr
                wrote on last edited by
                #10

                1% of the people is not necessarily the brightest and is approximately 60 million people left vulnerable. Exploits that are systematic should be discussed and explored and not brushed under the table as edge cases that will never happen.

                Need a C# Consultant? I'm available.
                Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway

                A 1 Reply Last reply
                0
                • E Ennis Ray Lynch Jr

                  1% of the people is not necessarily the brightest and is approximately 60 million people left vulnerable. Exploits that are systematic should be discussed and explored and not brushed under the table as edge cases that will never happen.

                  Need a C# Consultant? I'm available.
                  Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway

                  A Offline
                  A Offline
                  Anna Jayne Metcalfe
                  wrote on last edited by
                  #11

                  Sensitive information is like sex. Anyone who is not intelligent enough to take the right precautions shouldn't dabble unsupervised. Military security protocols are written with that in mind, which explains why (in the UK at least) most data leaks come from politicians and civil servants. I've been working with classified material for most of my career, and the way you handle it is not a matter of personal choice if you want to keep your job and reputation. At the end of the day there is no point in being paranoid. Take the right precautions, stay up to date and always be ready to change the way you do things in the light of new threats. That way you are very unlikely to be caught out by your own omissions or stupidity.

                  Anna :rose: Having a bad bug day? Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

                  E 1 Reply Last reply
                  0
                  • A Anna Jayne Metcalfe

                    Sensitive information is like sex. Anyone who is not intelligent enough to take the right precautions shouldn't dabble unsupervised. Military security protocols are written with that in mind, which explains why (in the UK at least) most data leaks come from politicians and civil servants. I've been working with classified material for most of my career, and the way you handle it is not a matter of personal choice if you want to keep your job and reputation. At the end of the day there is no point in being paranoid. Take the right precautions, stay up to date and always be ready to change the way you do things in the light of new threats. That way you are very unlikely to be caught out by your own omissions or stupidity.

                    Anna :rose: Having a bad bug day? Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

                    E Offline
                    E Offline
                    Ennis Ray Lynch Jr
                    wrote on last edited by
                    #12

                    Sometimes I don't know why I bother.

                    Need a C# Consultant? I'm available.
                    Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway

                    1 Reply Last reply
                    0
                    • E Ennis Ray Lynch Jr

                      Talk about a flawed system. It works great in the scenario of laptop being stolen and protecting data but not much to protect a system from intentional data theft. Imagine the following scenario: China wants access to the secrets contained on your bit locker secured laptop with TPM. Attacker secretly snatches laptop and replaces with identical machine whose boot simulates TPM start-up stealing pin, start-up key and optionally keys on TPM. The original machine is now compromised. Blah.

                      Need a C# Consultant? I'm available.
                      Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway

                      J Offline
                      J Offline
                      Jeremy Tierman
                      wrote on last edited by
                      #13

                      Don't give them any ideas! As if they didn't think about it already. I don't know much about it, but when I googled it, I found nothing about destroying data. For instance, if you enter the wrong pin in 5 times, the chip self destructs (I retain patent rights if someone follows through ;) ). What I don't get is why go to a cert based system where you prompt for a pin. You know the pin is numeric only and much easier to brute force than a username and strong alphanumeric character based password with biometric. Just my two cents.

                      A 1 Reply Last reply
                      0
                      • A Anna Jayne Metcalfe

                        I see a flaw, unless you are in the habit of carrying around pristine factory fresh laptops. I'd love to see them put together an "identical machine" to my laptop. The patterns of wear are pretty unmistakeable (e.g. the springs on the monitor clips have gone, along with some of the labels - others are faded). Worse, I've a habit of putting stickers on the thing, and I doubt they'd bother to do that... Paranoia can only take you so far, after all. :-\

                        Anna :rose: Having a bad bug day? Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

                        P Offline
                        P Offline
                        peterchen
                        wrote on last edited by
                        #14

                        Anna-Jayne Metcalfe wrote:

                        Worse, I've a habit of putting stickers on the thing, and I doubt they'd bother to do that

                        Wait wait wait... my mom putting all those cute lady bug stickers EVERYWHERE isn't just a mommy thing, but paranoia! :omg:

                        We are a big screwed up dysfunctional psychotic happy family - some more screwed up, others more happy, but everybody's psychotic joint venture definition of CP
                        blog: TDD - the Aha! | Linkify!| FoldWithUs! | sighist

                        A 1 Reply Last reply
                        0
                        • P peterchen

                          Anna-Jayne Metcalfe wrote:

                          Worse, I've a habit of putting stickers on the thing, and I doubt they'd bother to do that

                          Wait wait wait... my mom putting all those cute lady bug stickers EVERYWHERE isn't just a mommy thing, but paranoia! :omg:

                          We are a big screwed up dysfunctional psychotic happy family - some more screwed up, others more happy, but everybody's psychotic joint venture definition of CP
                          blog: TDD - the Aha! | Linkify!| FoldWithUs! | sighist

                          A Offline
                          A Offline
                          Anna Jayne Metcalfe
                          wrote on last edited by
                          #15

                          Something like that. Plus, it's rather cute. :-O

                          Anna :rose: Having a bad bug day? Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

                          1 Reply Last reply
                          0
                          • J Jeremy Tierman

                            Don't give them any ideas! As if they didn't think about it already. I don't know much about it, but when I googled it, I found nothing about destroying data. For instance, if you enter the wrong pin in 5 times, the chip self destructs (I retain patent rights if someone follows through ;) ). What I don't get is why go to a cert based system where you prompt for a pin. You know the pin is numeric only and much easier to brute force than a username and strong alphanumeric character based password with biometric. Just my two cents.

                            A Offline
                            A Offline
                            azonenberg
                            wrote on last edited by
                            #16

                            I use an in-house app called AESPad for all of my sensitive documents - a clone of WordPad with automatic 256-bit AES encryption. Keys are stored on a hardware token that's on me nearly 24/7, and as a second authentication factor, the key is hashed with a password before use. Cracking a system like that is pretty much impossible if you steal the laptop, because I'm not around to give you the password at that point. The only realistic options are: * get a spyware app onto the laptop to steal the key from RAM after I've unlocked the hardware device, or * steal the hardware token and somehow figure out the password. I'm experimenting with ways to make the first option impractical by performing on-chip crypto rather than doing it on the CPU.

                            1 Reply Last reply
                            0
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Don't have an account? Register

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups