BitLocker encryption broken in less than 43 seconds with sub-$10 Raspberry Pi Pico — key can be sniffed when using an external TPMLee Duna@lemmy.nz to Technology@lemmy.world – 734 points – 8 months agotomshardware.com66Post a CommentPreviewYou are viewing a single commentView all commentsShow the parent commentI wondered why LUUUUUKS didnt use the TPM, why do i have to put my password in... this is absolutely why. Edit: fixed spelling of LUUUUUKSAlso yes you can, I wouldn't recommend it though. Maybe in addition to your password though. Wait until you see Dracut and Tang.What exactly is the point of full disk encryption if the system auto-unlocks on boot?Protection against tampering, maybe? Bad excuse, but that is the logic I've heard.
I wondered why LUUUUUKS didnt use the TPM, why do i have to put my password in... this is absolutely why. Edit: fixed spelling of LUUUUUKSAlso yes you can, I wouldn't recommend it though. Maybe in addition to your password though. Wait until you see Dracut and Tang.What exactly is the point of full disk encryption if the system auto-unlocks on boot?Protection against tampering, maybe? Bad excuse, but that is the logic I've heard.
Also yes you can, I wouldn't recommend it though. Maybe in addition to your password though. Wait until you see Dracut and Tang.
What exactly is the point of full disk encryption if the system auto-unlocks on boot?Protection against tampering, maybe? Bad excuse, but that is the logic I've heard.
I wondered why LUUUUUKS didnt use the TPM, why do i have to put my password in... this is absolutely why.
Edit: fixed spelling of LUUUUUKS
Also yes you can, I wouldn't recommend it though. Maybe in addition to your password though.
Wait until you see Dracut and Tang.
What exactly is the point of full disk encryption if the system auto-unlocks on boot?
Protection against tampering, maybe?
Bad excuse, but that is the logic I've heard.