Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Re:Because it's a pain on Linux (Score 1) 446

It's certainly better than nothing and will likely deter all but the targeted industrial (or governmental) espionage attacks. Then again, i'd rather use the best solution, rather than a "good enough" one.

If you are really concerned about industrial/governmental attacks, you should definitely read the "Maintenance" section in the TPM standard. It specifies an optional backdoor which allows the manufacturer to extract your keys from the TPM. Of course it's not called a "backdoor", it's just a convenient way to retrieve the so-called "non-migratable" keys when your motherboard dies, but you can imagine other uses.

I'd rather use a "good enough" solution with no known weaknesses against my threat model, than one which gives a false sense of absolute security. The key should not be in the laptop, even in a TPM, period.

AC

Slashdot Top Deals

The only possible interpretation of any research whatever in the `social sciences' is: some do, some don't. -- Ernest Rutherford

Working...