What part of that is reasonable exactly? As far as I can tell the TPM only weakens security by storing the keys in a separate computer, once there's an exploit with that someone physically attacking your computer could easily exfiltrate keys where they couldn't if you're just typing a passphrase into EG cryptsetup.
What part of that is reasonable exactly? As far as I can tell the TPM only weakens security by storing the keys in a separate computer, once there's an exploit with that someone physically attacking your computer could easily exfiltrate keys where they couldn't if you're just typing a passphrase into EG cryptsetup.