Ars Technica
•Technology
Technology
76% Informative
A security researcher demonstrated an exploit that could break Microsoft 's BitLocker encryption in " less than 50 seconds " The exploit works by using the Pi to monitor communication between an external TPM chip and the rest of the laptop.
This is not a new exploit, and StackSmashing has repeatedly said as much.
Many modern systems use firmware TPM modules, or fTPMs, that are built directly into most processors.
StackSmashing posted photos of a ThinkPad X1 Carbon Gen 11 with a hardware TPM and all the pins someone would need to try to nab the encryption key.
Laptops made before 2015 or 2016 are all virtually guaranteed to be using hardware tPMs.
Some security researchers have been able to defeat the fTPMs in some of AMD 's processors with " 23 hours of physical access to the target device".
VR Score
68
Informative language
62
Neutral language
57
Article tone
semi-formal
Language
English
Language complexity
56
Offensive language
not offensive
Hate speech
not hateful
Attention-grabbing headline
not detected
Known propaganda techniques
not detected
Time-value
medium-lived
External references
9
Source diversity
9
Affiliate links
no affiliate links