tias

joined 1 year ago
[–] tias@discuss.tchncs.de 20 points 9 months ago

Even better. Or maybe both.

[–] tias@discuss.tchncs.de 39 points 9 months ago (7 children)

Every time a court finds that the USPTO has issued an invalid patent, they should be given a sizable fine. The patent system won't work as long as the USPTO has an incentive to turn a blind eye to shit patents.

[–] tias@discuss.tchncs.de 51 points 9 months ago (2 children)

What poorly thought out language. First they call FCC "tough", then they go on to imply that it's surprising that this wasn't a requirement before. IMO "tough" would be something that exceeds ordinary expectations.

[–] tias@discuss.tchncs.de 32 points 9 months ago* (last edited 9 months ago) (2 children)

The thing we should do is to hold car manufacturers accountable for neglecting security in cars.

[–] tias@discuss.tchncs.de 1 points 9 months ago (1 children)

I'm talking about letting the user change their own password. I'm honestly not sure how that would be technically accomplished in this situation without having to contact IT each time. It seems like something Microsoft should provide a no-frills GUI for that doesn't require elevation.

[–] tias@discuss.tchncs.de 4 points 9 months ago (10 children)

Surely some smart key exchange algorithm could be used for that, e.g. the CPU provides a public key to the TPM and the TPM encrypts the symmetric disk key with that public key. Similar to how TLS works.

[–] tias@discuss.tchncs.de -2 points 9 months ago* (last edited 9 months ago) (5 children)

Which kind of makes it useless in many corporate environments where it's most needed, since the users won't be able to set their own password.

[–] tias@discuss.tchncs.de 3 points 9 months ago (7 children)

Thanks, that sounds really useful. I'm guessing it won't work unless you're local admin though.

[–] tias@discuss.tchncs.de 26 points 9 months ago* (last edited 9 months ago) (9 children)

I guess they mean use the password as part of the encryption key, or encrypt the key with the password. Bitlocker doesn't use the user's password in that way, which is why it can boot an encrypted system without user interaction. That part always seemed very sketchy to me.

[–] tias@discuss.tchncs.de 67 points 9 months ago* (last edited 9 months ago) (13 children)

I thought the point of the TPM was that the keys would be kept internally to the TPM at all times and that any data lanes would only be used for transferring payload. Why are they sending keys between the TPM and the CPU?

[–] tias@discuss.tchncs.de 6 points 9 months ago

Those long rambling intros have started to happen on TikTok more and more

view more: ‹ prev next ›