Lee Duna to TechnologyEnglish • 10 months agoBitLocker encryption broken in less than 43 seconds with sub-$10 Raspberry Pi Pico — key can be sniffed when using an external TPMwww.tomshardware.comexternal-linkmessage-square68fedilinkarrow-up1757arrow-down118
arrow-up1739arrow-down1external-linkBitLocker encryption broken in less than 43 seconds with sub-$10 Raspberry Pi Pico — key can be sniffed when using an external TPMwww.tomshardware.comLee Duna to TechnologyEnglish • 10 months agomessage-square68fedilink
minus-squarepeopleproblemslinkEnglish68•10 months agoVery end of the article explains you need access to the TPM communication hardware, which no longer occurs external to Intel and And cpus
minus-squaremassive_bereavementlinkfedilink25•10 months agoTo *newer Intel and AMD cpus and only certain models. There’s a lot of current hardware that uses embedded TPMs. It also depends on the communication path between the CPU and the module, but chances are it will be clear text and in some, via LPC.
minus-square@SpaceMan9000linkEnglish12•10 months agoShould be noted that if a password is asked to decrypt the drive it also doesn’t work.
minus-square@amenoteflinkEnglish11•edit-210 months agoSo offline (external) bitlocker drives that are unlocked with the key only. Or internal bitlocker drives that are unlocked with AMD fTPM are excluded from this exploit?
Very end of the article explains you need access to the TPM communication hardware, which no longer occurs external to Intel and And cpus
To *newer Intel and AMD cpus and only certain models.
There’s a lot of current hardware that uses embedded TPMs. It also depends on the communication path between the CPU and the module, but chances are it will be clear text and in some, via LPC.
deleted by creator
Should be noted that if a password is asked to decrypt the drive it also doesn’t work.
So offline (external) bitlocker drives that are unlocked with the key only.
Or internal bitlocker drives that are unlocked with AMD fTPM are excluded from this exploit?