Lee Duna@lemmy.nz to Technology@lemmy.worldEnglish · 8 months agoBitLocker encryption broken in less than 43 seconds with sub-$10 Raspberry Pi Pico — key can be sniffed when using an external TPMwww.tomshardware.comexternal-linkmessage-square53fedilinkarrow-up1742arrow-down118cross-posted to: hackernews@lemmy.smeargle.fans
arrow-up1724arrow-down1external-linkBitLocker encryption broken in less than 43 seconds with sub-$10 Raspberry Pi Pico — key can be sniffed when using an external TPMwww.tomshardware.comLee Duna@lemmy.nz to Technology@lemmy.worldEnglish · 8 months agomessage-square53fedilinkcross-posted to: hackernews@lemmy.smeargle.fans
minus-squarepeopleproblems@lemmy.worldlinkfedilinkEnglisharrow-up64·8 months agoVery end of the article explains you need access to the TPM communication hardware, which no longer occurs external to Intel and And cpus
minus-squareSpaceMan9000@lemmy.worldlinkfedilinkEnglisharrow-up12·8 months agoShould be noted that if a password is asked to decrypt the drive it also doesn’t work.
minus-squareamenotef@lemmy.worldlinkfedilinkEnglisharrow-up11·edit-28 months agoSo offline (external) bitlocker drives that are unlocked with the key only. Or internal bitlocker drives that are unlocked with AMD fTPM are excluded from this exploit?
Very end of the article explains you need access to the TPM communication hardware, which no longer occurs external to Intel and And cpus
Should be noted that if a password is asked to decrypt the drive it also doesn’t work.
So offline (external) bitlocker drives that are unlocked with the key only.
Or internal bitlocker drives that are unlocked with AMD fTPM are excluded from this exploit?