Hacker News new | past | comments | ask | show | jobs | submit login

>sort of reasonable I guess

What part of that is reasonable exactly? As far as I can tell the TPM only weakens security by storing the keys in a separate computer, once there's an exploit with that someone physically attacking your computer could easily exfiltrate keys where they couldn't if you're just typing a passphrase into EG cryptsetup.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: