Microsoft’s Bitlocker & TPM encryption combo defeated with a $10 Raspberry Pi::The point of Microsoft’s Bitlocker security feature is to protect personal data stored locally on devices and particularly when those devices are lost or otherwise physically compromised. With Bi

  • @Godort@lemm.ee
    link
    fedilink
    English
    1661 year ago

    It should be noted that this attack was demonstrated on a nearly 10 year old laptop that has the TPM traces exposed on the motherboard.

    Most TPMs nowadays are built into the CPU which does not leave them vulnerable to this type of attack.

    • @cheese_greater@lemmy.world
      link
      fedilink
      English
      28
      edit-2
      1 year ago

      Its definitely sort or misleading but MS needs to really have its feet held to the fire when it comes to these things. It sort of pushes the narrative in the correct direction which is towards privacy AND security, not a half-ass balance where one or the other or both is compromised or is an illusion altogether

      The Outlook stuff has demonstrated how fundamentally irresponsible and unserious they are about their obligation to secure and regulate their own systems, they need all the bad press they can get so they are compelled to do betwr

      • Shadow
        link
        fedilink
        English
        18
        edit-2
        1 year ago

        Because MS designed Lenovo motherboard for them and told them where to put the tpm debug pins? I think you’re casting blame at the wrong vendor here.

        Doesn’t matter how good the software is if the hardware vendor fucks up like that.

        • Natanael
          link
          fedilink
          English
          11 year ago

          They’re heavily involved with the development of the spec and guidance to OEMs on how to implement it

    • @f4f4f4f4f4f4f4f4@lemmy.world
      link
      fedilink
      English
      351 year ago

      I get your joke, but it’s even cheaper than a “Raspberry Pi”. Pi Pico, one RP2040 chip, that’s basically RPi’s new version of a Teensy. I just installed one in my GameCube to defeat its “BIOS” and boot from micro SD card :P

      • @andrewth09@lemmy.world
        link
        fedilink
        English
        171 year ago

        I just installed one in my GameCube to defeat its “BIOS” and boot from micro SD card :P

        Coolest thing I heard all day. Didn’t know that was a thing.

  • bruhduh
    link
    fedilink
    English
    341 year ago

    Yet another example of “hardware access is root access”

  • circuscritic
    link
    fedilink
    English
    321 year ago

    $10… not really in video. He had a custom PCB made so the pogo pins were on the board, all in one.

    Honestly, pretty awesome. Although as noted, this is for older boards without TPM integration in CPU.

    It can also be done with a logic analyzer.

    • circuscritic
      link
      fedilink
      English
      19
      edit-2
      1 year ago

      It’s a Pi Pico (RP2040), which is an MCU, not CPU. Similar to an Arduino UNO (ATmega328p).

  • @trackcharlie@lemmynsfw.com
    link
    fedilink
    English
    16
    edit-2
    1 year ago

    The concept and implementation of TPM use has been a joke since inception.

    veracrypt or luks; bitlocker is a total joke.

  • Optional
    link
    fedilink
    English
    31 year ago

    Hey - hey member that time when Truecrypt was like, “Peace, we out. Use bitlocker. lol”

    When’s the new Truecrypt coming out? Yeah yeah Veracrypt, I know. It’s cool, its just not. I dunno.

    • Natanael
      link
      fedilink
      English
      191 year ago

      Bitlocker’s threat model is physical access, though. And it’s 50% of TPM’s threat model too.

      • @LainTrain@lemmy.dbzer0.com
        link
        fedilink
        English
        0
        edit-2
        1 year ago

        Yeah which is why no one cares about either. The threat vector is usually not discussed and mostly ignored by non state-level actors in practice.

        I do agree that it’s fascinating. My master’s degree thesis was on sourcing trust and eliminating various evil maid type attacks, including supply side targeted poisoned hardware aimed at state level.