Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)VZ
Posts
0
Comments
182
Joined
2 yr. ago

  • Once that key is loaded in memory anyone with 10 minutes and access to google could trivially unlock your computer in several different ways. It is virtually exactly like having no security whatsoever.

    I highly doubt it.

    If you have any tips for how I can personally bypass my computer's encryption in 10 minutes without being able to login, I'd love to try my hand at it.

  • The idea behind it is that the files are stored encrypted at rest, which is really what you want, because once a system is booted, you have to play by the computer's rules (respect file permissions, policies, etc.).

    The TPM provides a secure mechanism to provide a decryption key to the computer during boot, eliminating the need for direct interaction.

    Could it be compromised? Probably, but it would take considerably more effort than a man-in-the-middle on your keyboard via a logic analyzer.

  • I second this.

    Full disk encryption is entirely practical for everyday use. If you don't already have a dedicated TPM, your motherboard/CPU may provide a software TPM (fTPM?). If so, you don't even have to interact with the machine during boot. It's just a bit slower to start up (by a few seconds), which really isn't a big issue for your average user.

  • My jaw damn near hit the floor when I got the offer. A lot of it is wrapped up in stocks, but the base salary is 175k with a cash signing bonus of 160k spread across the first two years' paychecks.

    Despite that (and even when saving quite aggressively), I still can't afford more than my tiny condo in my area. It's silly.