• andyburke
    link
    fedilink
    25 months ago

    Or, if I can extract that key from the hardware, I can pretend to be that hardware whenever I want, right?

    • Dark Arc
      link
      fedilink
      English
      15 months ago

      Hmmm… I was going to say no because it’s asymmetric crypto, but you’re right if you are somehow able to extract the signed private key, you can still lie… Good point

      • @yggstyle
        link
        English
        25 months ago

        Got some bad news. They already can do that. It’s a very low effort attack too. Current TPM spits its key out in clear text. Funny right?