> From: Vitaly Zaitsev via devel [mailto:devel@xxxxxxxxxxxxxxxxxxxxxxx] > Sent: Thursday, December 30, 2021 12:18 PM > On 29/12/2021 15:20, Roberto Sassu via devel wrote: > > The TPM has a fundamental advantage, compared to other > > mechanisms. It is tamperproof, it often receives high-grade > > certifications, and it is one of the few components that you > > could rely on to protect your sensitive data in the event your > > host becomes compromised. > > https://arstechnica.com/gadgets/2021/08/how-to-go-from-stolen-pc-to- > network-intrusion-in-30-minutes/ If I understood the article correctly, the communication was spoofed due to not using the encrypted session feature of the TPM. The TPM also supports protection against tampering of the communication with the HMAC session. Roberto HUAWEI TECHNOLOGIES Duesseldorf GmbH, HRB 56063 Managing Director: Li Peng, Zhong Ronghua _______________________________________________ devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure