On 12/9/21 10:15, Vitaly Zaitsev via devel wrote:
On 09/12/2021 15:32, Lennart Poettering wrote:
TPM2 chip you'll get much weaker security guarantees
https://arstechnica.com/gadgets/2021/08/how-to-go-from-stolen-pc-to-network-intrusion-in-30-minutes/
The Lenovo TPM implementation exploited here did not use TPM traffic
encryption so the attackers simply eavesdropped on the traffic to the
TPM during the boot. As the article says, the TPM2 standard specifies
traffic encryption that would have prevented that attack.
_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure