logoalt Hacker News

jojobasyesterday at 3:24 AM2 repliesview on HN

TPMs add security against a narrow case of evil maid attacks. They might be useful for corporate computing (for cargo cult compliance purposes more than actual security) but they trojan horse more of "not owning the device you bought" with it to people that don't and shouldn't care about evil maid attacks at all.


Replies

jeroenhdyesterday at 10:52 AM

Adding brute force resistance to consumer hardware is pretty useful. Now your password can be John1985 without fear of getting brute forced within seconds.

"I don't use a TPM in my computer so it shouldn't exist" has always sounded like a weird argument against the tech in my opinion.

Many Android phones have their secret storage implemented as a virtual machine rather than a TPM. The lack of a TPM doesn't suddenly give me any more freedom, although it does come with security downsides.

fsfloveryesterday at 7:11 AM

TPMs can also be based on free software and our own keys. It works well with Heads and Librem Key.