Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> For example, what kind of resources are required to break the disk encryption of a computer protected with tpm 2.0 + secureboot + luks w/tresor* ?

a: 1 copy of all the computer hardware present in the target system.

b: 1 secure radio link of sufficient bandwidth.

c: 1 apartment or van near the target system.

d: Sufficient equipment to interface with the target system (now in said apartment/van[c]) well enough to replicate its login UI (via radio link[b]) on the fake copy of it[a] you left in its place when you stole it.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: