Cyph3rp9nk on Nostr: The use of TPM is controversial, they have managed to decrypt disks through the ...
The use of TPM is controversial, they have managed to decrypt disks through the vulnerabilities of the same, and the TPM are like the secure element, in the article obviate this, hence many deny using it.
I prefer my encryption to depend on the strength of my password than to rely on a third party, this has been the Linux approach and should continue to be the case, from my point of view.
Published at
2024-10-25 09:05:21Event JSON
{
"id": "ff7a202ab2bf7eb6241e5f494e8790519205876548b2ee47ca191fb795b63bfa",
"pubkey": "fcf70a45cfa817eaa813b9ba8a375d713d3169f4a27f3dcac3d49112df67d37e",
"created_at": 1729847121,
"kind": 1,
"tags": [
[
"e",
"06fd080156a9db6d4e891cbe85951841cdf948c64f46c5c352d851e42a7f8297",
"",
"root"
],
[
"e",
"871f674c1f253ded9a2f84fd9eb7c712d0d0367d3011b7846cc01c234dd9dd9c",
"",
"reply"
],
[
"p",
"fcf70a45cfa817eaa813b9ba8a375d713d3169f4a27f3dcac3d49112df67d37e"
],
[
"p",
"8633073b8567da97ad119fedd9716154aa283234cbb7d28d5131daa077d1cf7a"
]
],
"content": "The use of TPM is controversial, they have managed to decrypt disks through the vulnerabilities of the same, and the TPM are like the secure element, in the article obviate this, hence many deny using it.\n\nI prefer my encryption to depend on the strength of my password than to rely on a third party, this has been the Linux approach and should continue to be the case, from my point of view.",
"sig": "a5545273d23e7549ecf245e63b3b20ad5536d3d0a01c8b10bbd65e4591ba3d719dacc3c89ad42168a656cb6031c4a6c8da39f15192498be741afefaf73566e40"
}