Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I doubt it. A much more likely suspect is the Intel Management Engine, which unlike a TPM module, runs an entire operating system alongside your computer and hides it's outgoing traffic as encrypted TLS data. Yikes.

A much more likely explanation for TPM is that it can enforce weak and vulnerable cryptography at a hardware level. It's an open secret by this point that the NSA weakens elliptic keypairs to make them vulnerable to differential cryptanalysis. With TPM, software can now be forced to use hardware crypto, which is almost always weaker than the programmable software crypto we had before.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: