Secure key handling using the TPM
Secure key handling using the TPM
Posted Oct 18, 2018 6:43 UTC (Thu) by smurf (subscriber, #17840)In reply to: Secure key handling using the TPM by mjg59
Parent article: Secure key handling using the TPM
Again, that depends on the threat model. You're assuming that the adversary has access to the complete computer.
If they can "only" get away with [a copy of] the disk, the TPM approach does improve security.