• andyburke
    link
    fedilink
    28 months ago

    Or, if I can extract that key from the hardware, I can pretend to be that hardware whenever I want, right?

    • Dark Arc
      link
      fedilink
      English
      18 months ago

      Hmmm… I was going to say no because it’s asymmetric crypto, but you’re right if you are somehow able to extract the signed private key, you can still lie… Good point

      • @yggstyle
        link
        English
        28 months ago

        Got some bad news. They already can do that. It’s a very low effort attack too. Current TPM spits its key out in clear text. Funny right?