1 |
On Sun, Mar 29, 2015 at 03:30:07PM -0400, Rich Freeman wrote |
2 |
|
3 |
> With TPM, full-disk encryption, and a verified boot path, you could |
4 |
> actually protect against that scenario (they'd have to tear apart the |
5 |
> TPM chip and try to access the non-volatile storage directly, and the |
6 |
> chips are specifically designed to defeat this). Secure boot would |
7 |
> not hurt either (with your own keys). Of course, they could still try |
8 |
> to hack in via USB/PCI/etc, or plant keyloggers and such. I'm not |
9 |
> suggesting physical security isn't important. It just isn't a good |
10 |
> reason to completely neglect console security. |
11 |
|
12 |
Be careful what you wish for. I have my doubts that TPM chips would |
13 |
boot linux with Microsoft offering "volume discounts" to OEMS. Call me |
14 |
cynical. |
15 |
|
16 |
-- |
17 |
Walter Dnes <waltdnes@××××××××.org> |
18 |
I don't run "desktop environments"; I run useful applications |