Lee Duna to TechnologyEnglish • 1 year agoBitLocker encryption broken in less than 43 seconds with sub-$10 Raspberry Pi Pico — key can be sniffed when using an external TPMwww.tomshardware.comexternal-linkmessage-square68fedilinkarrow-up1757arrow-down118
arrow-up1739arrow-down1external-linkBitLocker encryption broken in less than 43 seconds with sub-$10 Raspberry Pi Pico — key can be sniffed when using an external TPMwww.tomshardware.comLee Duna to TechnologyEnglish • 1 year agomessage-square68fedilink
minus-squarepeopleproblemslinkEnglish68•1 year agoVery end of the article explains you need access to the TPM communication hardware, which no longer occurs external to Intel and And cpus
minus-squaremassive_bereavementlinkfedilink25•1 year agoTo *newer Intel and AMD cpus and only certain models. There’s a lot of current hardware that uses embedded TPMs. It also depends on the communication path between the CPU and the module, but chances are it will be clear text and in some, via LPC.
minus-square@SpaceMan9000linkEnglish12•1 year agoShould be noted that if a password is asked to decrypt the drive it also doesn’t work.
minus-square@amenoteflinkEnglish11•edit-21 year agoSo offline (external) bitlocker drives that are unlocked with the key only. Or internal bitlocker drives that are unlocked with AMD fTPM are excluded from this exploit?
Very end of the article explains you need access to the TPM communication hardware, which no longer occurs external to Intel and And cpus
To *newer Intel and AMD cpus and only certain models.
There’s a lot of current hardware that uses embedded TPMs. It also depends on the communication path between the CPU and the module, but chances are it will be clear text and in some, via LPC.
deleted by creator
Should be noted that if a password is asked to decrypt the drive it also doesn’t work.
So offline (external) bitlocker drives that are unlocked with the key only.
Or internal bitlocker drives that are unlocked with AMD fTPM are excluded from this exploit?