On Sun, Mar 29, 2015 at 03:30:07PM -0400, Rich Freeman wrote

> With TPM, full-disk encryption, and a verified boot path, you could
> actually protect against that scenario (they'd have to tear apart the
> TPM chip and try to access the non-volatile storage directly, and the
> chips are specifically designed to defeat this).  Secure boot would
> not hurt either (with your own keys).  Of course, they could still try
> to hack in via USB/PCI/etc, or plant keyloggers and such.  I'm not
> suggesting physical security isn't important.  It just isn't a good
> reason to completely neglect console security.

  Be careful what you wish for.  I have my doubts that TPM chips would
boot linux with Microsoft offering "volume discounts" to OEMS.  Call me
cynical.

-- 
Walter Dnes <waltd...@waltdnes.org>
I don't run "desktop environments"; I run useful applications

Reply via email to