logoalt Hacker News

metalcrowyesterday at 2:35 AM3 repliesview on HN

That's fair, although aren't most TPMs nowadays fTPMs? No interceptable communication that way.


Replies

Retr0idyesterday at 2:48 AM

Until they require fTPMs, an attacker can just choose to use a regular TPM.

A more sophisticated attacker could plausibly extract key material from the TPM itself via sidechannels, and sign their own attestations.

show 1 reply
nextaccounticyesterday at 4:59 AM

what about faulTPM? https://arxiv.org/abs/2304.14717

edoceoyesterday at 3:06 AM

Can a TPM be faked in a QEMU VM?

show 3 replies