Secure key handling using the TPM
Secure key handling using the TPM
Posted Oct 19, 2018 7:54 UTC (Fri) by jgg (subscriber, #55211)In reply to: Secure key handling using the TPM by mjg59
Parent article: Secure key handling using the TPM
If I borrow your computer, disassemble it, clone the disk, then put it back, you have no idea it was stolen and I can access your data as soon as I observe the passphrase through some means.
With the TPM even if I do all of these steps I can't decrypt the copy of the drive as I need the physical TPM as well.
Of course if I steal the entire computer then more options are possible, but at least you'll know the computer was stolen and can take counter-mesaures, ie re-keying online accounts, etc.