Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. TPM Sucks

TPM Sucks

Scheduled Pinned Locked Moved The Lounge
csharpcomquestion
16 Posts 8 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • E Ennis Ray Lynch Jr

    Talk about a flawed system. It works great in the scenario of laptop being stolen and protecting data but not much to protect a system from intentional data theft. Imagine the following scenario: China wants access to the secrets contained on your bit locker secured laptop with TPM. Attacker secretly snatches laptop and replaces with identical machine whose boot simulates TPM start-up stealing pin, start-up key and optionally keys on TPM. The original machine is now compromised. Blah.

    Need a C# Consultant? I'm available.
    Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway

    A Offline
    A Offline
    Anna Jayne Metcalfe
    wrote on last edited by
    #7

    I see a flaw, unless you are in the habit of carrying around pristine factory fresh laptops. I'd love to see them put together an "identical machine" to my laptop. The patterns of wear are pretty unmistakeable (e.g. the springs on the monitor clips have gone, along with some of the labels - others are faded). Worse, I've a habit of putting stickers on the thing, and I doubt they'd bother to do that... Paranoia can only take you so far, after all. :-\

    Anna :rose: Having a bad bug day? Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

    E P 2 Replies Last reply
    0
    • A Anna Jayne Metcalfe

      I see a flaw, unless you are in the habit of carrying around pristine factory fresh laptops. I'd love to see them put together an "identical machine" to my laptop. The patterns of wear are pretty unmistakeable (e.g. the springs on the monitor clips have gone, along with some of the labels - others are faded). Worse, I've a habit of putting stickers on the thing, and I doubt they'd bother to do that... Paranoia can only take you so far, after all. :-\

      Anna :rose: Having a bad bug day? Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

      E Offline
      E Offline
      Ennis Ray Lynch Jr
      wrote on last edited by
      #8

      Really, you have seen your laptops motherboard or any modern spy movie? A couple of screws is all it would take. As a practical matter it is a serious flaw that should not be pushed aside.

      Need a C# Consultant? I'm available.
      Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway

      A 1 Reply Last reply
      0
      • E Ennis Ray Lynch Jr

        Really, you have seen your laptops motherboard or any modern spy movie? A couple of screws is all it would take. As a practical matter it is a serious flaw that should not be pushed aside.

        Need a C# Consultant? I'm available.
        Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway

        A Offline
        A Offline
        Anna Jayne Metcalfe
        wrote on last edited by
        #9

        I take special care to only buy those laptops which spring apart in the most confusing manner when you try to dissemble them (ever try to reassemble a toaster? Clue: don't). Oh, and the thing is never out of my sight. That probably helps, too. As does the use of military grade encryption. ;P Seriously, the worst thing that will happen to 99% of people out there is that the machineis stolen. Unless you work on defence projects or handle financial information for banks a decent encryption policy is more than adequate in virtually all cases. Of course, if you carry restricted information on a laptop and leave it unattended, any consequences are your own fault, really.

        Anna :rose: Having a bad bug day? Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

        E 1 Reply Last reply
        0
        • A Anna Jayne Metcalfe

          I take special care to only buy those laptops which spring apart in the most confusing manner when you try to dissemble them (ever try to reassemble a toaster? Clue: don't). Oh, and the thing is never out of my sight. That probably helps, too. As does the use of military grade encryption. ;P Seriously, the worst thing that will happen to 99% of people out there is that the machineis stolen. Unless you work on defence projects or handle financial information for banks a decent encryption policy is more than adequate in virtually all cases. Of course, if you carry restricted information on a laptop and leave it unattended, any consequences are your own fault, really.

          Anna :rose: Having a bad bug day? Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

          E Offline
          E Offline
          Ennis Ray Lynch Jr
          wrote on last edited by
          #10

          1% of the people is not necessarily the brightest and is approximately 60 million people left vulnerable. Exploits that are systematic should be discussed and explored and not brushed under the table as edge cases that will never happen.

          Need a C# Consultant? I'm available.
          Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway

          A 1 Reply Last reply
          0
          • E Ennis Ray Lynch Jr

            1% of the people is not necessarily the brightest and is approximately 60 million people left vulnerable. Exploits that are systematic should be discussed and explored and not brushed under the table as edge cases that will never happen.

            Need a C# Consultant? I'm available.
            Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway

            A Offline
            A Offline
            Anna Jayne Metcalfe
            wrote on last edited by
            #11

            Sensitive information is like sex. Anyone who is not intelligent enough to take the right precautions shouldn't dabble unsupervised. Military security protocols are written with that in mind, which explains why (in the UK at least) most data leaks come from politicians and civil servants. I've been working with classified material for most of my career, and the way you handle it is not a matter of personal choice if you want to keep your job and reputation. At the end of the day there is no point in being paranoid. Take the right precautions, stay up to date and always be ready to change the way you do things in the light of new threats. That way you are very unlikely to be caught out by your own omissions or stupidity.

            Anna :rose: Having a bad bug day? Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

            E 1 Reply Last reply
            0
            • A Anna Jayne Metcalfe

              Sensitive information is like sex. Anyone who is not intelligent enough to take the right precautions shouldn't dabble unsupervised. Military security protocols are written with that in mind, which explains why (in the UK at least) most data leaks come from politicians and civil servants. I've been working with classified material for most of my career, and the way you handle it is not a matter of personal choice if you want to keep your job and reputation. At the end of the day there is no point in being paranoid. Take the right precautions, stay up to date and always be ready to change the way you do things in the light of new threats. That way you are very unlikely to be caught out by your own omissions or stupidity.

              Anna :rose: Having a bad bug day? Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

              E Offline
              E Offline
              Ennis Ray Lynch Jr
              wrote on last edited by
              #12

              Sometimes I don't know why I bother.

              Need a C# Consultant? I'm available.
              Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway

              1 Reply Last reply
              0
              • E Ennis Ray Lynch Jr

                Talk about a flawed system. It works great in the scenario of laptop being stolen and protecting data but not much to protect a system from intentional data theft. Imagine the following scenario: China wants access to the secrets contained on your bit locker secured laptop with TPM. Attacker secretly snatches laptop and replaces with identical machine whose boot simulates TPM start-up stealing pin, start-up key and optionally keys on TPM. The original machine is now compromised. Blah.

                Need a C# Consultant? I'm available.
                Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway

                J Offline
                J Offline
                Jeremy Tierman
                wrote on last edited by
                #13

                Don't give them any ideas! As if they didn't think about it already. I don't know much about it, but when I googled it, I found nothing about destroying data. For instance, if you enter the wrong pin in 5 times, the chip self destructs (I retain patent rights if someone follows through ;) ). What I don't get is why go to a cert based system where you prompt for a pin. You know the pin is numeric only and much easier to brute force than a username and strong alphanumeric character based password with biometric. Just my two cents.

                A 1 Reply Last reply
                0
                • A Anna Jayne Metcalfe

                  I see a flaw, unless you are in the habit of carrying around pristine factory fresh laptops. I'd love to see them put together an "identical machine" to my laptop. The patterns of wear are pretty unmistakeable (e.g. the springs on the monitor clips have gone, along with some of the labels - others are faded). Worse, I've a habit of putting stickers on the thing, and I doubt they'd bother to do that... Paranoia can only take you so far, after all. :-\

                  Anna :rose: Having a bad bug day? Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

                  P Offline
                  P Offline
                  peterchen
                  wrote on last edited by
                  #14

                  Anna-Jayne Metcalfe wrote:

                  Worse, I've a habit of putting stickers on the thing, and I doubt they'd bother to do that

                  Wait wait wait... my mom putting all those cute lady bug stickers EVERYWHERE isn't just a mommy thing, but paranoia! :omg:

                  We are a big screwed up dysfunctional psychotic happy family - some more screwed up, others more happy, but everybody's psychotic joint venture definition of CP
                  blog: TDD - the Aha! | Linkify!| FoldWithUs! | sighist

                  A 1 Reply Last reply
                  0
                  • P peterchen

                    Anna-Jayne Metcalfe wrote:

                    Worse, I've a habit of putting stickers on the thing, and I doubt they'd bother to do that

                    Wait wait wait... my mom putting all those cute lady bug stickers EVERYWHERE isn't just a mommy thing, but paranoia! :omg:

                    We are a big screwed up dysfunctional psychotic happy family - some more screwed up, others more happy, but everybody's psychotic joint venture definition of CP
                    blog: TDD - the Aha! | Linkify!| FoldWithUs! | sighist

                    A Offline
                    A Offline
                    Anna Jayne Metcalfe
                    wrote on last edited by
                    #15

                    Something like that. Plus, it's rather cute. :-O

                    Anna :rose: Having a bad bug day? Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

                    1 Reply Last reply
                    0
                    • J Jeremy Tierman

                      Don't give them any ideas! As if they didn't think about it already. I don't know much about it, but when I googled it, I found nothing about destroying data. For instance, if you enter the wrong pin in 5 times, the chip self destructs (I retain patent rights if someone follows through ;) ). What I don't get is why go to a cert based system where you prompt for a pin. You know the pin is numeric only and much easier to brute force than a username and strong alphanumeric character based password with biometric. Just my two cents.

                      A Offline
                      A Offline
                      azonenberg
                      wrote on last edited by
                      #16

                      I use an in-house app called AESPad for all of my sensitive documents - a clone of WordPad with automatic 256-bit AES encryption. Keys are stored on a hardware token that's on me nearly 24/7, and as a second authentication factor, the key is hashed with a password before use. Cracking a system like that is pretty much impossible if you steal the laptop, because I'm not around to give you the password at that point. The only realistic options are: * get a spyware app onto the laptop to steal the key from RAM after I've unlocked the hardware device, or * steal the hardware token and somehow figure out the password. I'm experimenting with ways to make the first option impractical by performing on-chip crypto rather than doing it on the CPU.

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups