Secure key handling using the TPM
Secure key handling using the TPM
Posted Oct 18, 2018 7:25 UTC (Thu) by mjg59 (subscriber, #23239)In reply to: Secure key handling using the TPM by smurf
Parent article: Secure key handling using the TPM
You need to construct a pretty elaborate model to be able to obtain someone's password without either:
a) Having physical access to the system, or
b) Having enough control over the system to be able to exfiltrate the contents of the disk after it's been unlocked