Hacker News new | past | comments | ask | show | jobs | submit login

You can't "dump" a TPM. That's the whole point. They are designed such that the cryptographic secrets they hold (including ones loaded at manufacturing) are unrecoverable without an electron microscope and nation-state level resources (and even then, it would be extremely difficult if not impossible on modern process nodes).



> You can't "dump" a TPM.

> unrecoverable without an electron microscope and nation-state level resources (and even then, it would be extremely difficult if not impossible on modern process nodes).

Oh, so you can. It's only a matter of time.


Even with an electron microscope you wouldn't extract a root key it would just be a device key which they would then ban.


There's plenty that one would be able to do with a device key before it is banned.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: