2009/8/20 Michael Gorven <mich...@gorven.za.net>:
> On Thursday 20 August 2009 10:20:02 Michal Suchanek wrote:
>> 2009/8/20 Michael Gorven <mich...@gorven.za.net>:
>> > On Thursday 20 August 2009 09:59:42 Michal Suchanek wrote:
>> >> 2009/8/20 Michael Gorven <mich...@gorven.za.net>:
>> >> > On Thursday 20 August 2009 09:49:06 Michal Suchanek wrote:
>> >> >> 2009/8/20 Michael Gorven <mich...@gorven.za.net>:
>> >> >> > On Wednesday 19 August 2009 21:21:28 Michal Suchanek wrote:
>> >> >> >> Tell me one technical benefit of TPM over coreboot.
>> >> >> >
>> >> >> > Coreboot doesn't provide protected storage of secrets (e.g.
>> >> >> > harddrive decryption keys).
>> >> >>
>> >> >> TPM does not either at the time the BIOS is loaded. Remember, it's
>> >> >> the CPU what's running the BIOS, not the TPM chip.
>> >> >>
>> >> >> Only after BIOS enables TPM or coreboot enables any crypto device you
>> >> >> choose you get any secrets or keys.
>> >> >
>> >> > So? It's still protected storage. You can read a BIOS chip, but you
>> >> > can't just read the contents of a TPM chip.
>> >>
>> >> You can use decent crypto storage rather than half-broken TPM. There
>> >> is no advantage to using it.
>> >
>> > Like what?
>>
>> There is hardware for secure key storage which you can put into some
>> card slot or USB and unlike TPM you can also remove it and store
>> separately from the computer which greatly decreases the chance that
>> your data would be compromised if your computer is stolen.
>
> But that doesn't protect the machine (and crypto card) from being physically
> compromised, so it's not the same as TPM.

How does TPM protest your machine from physical access? I thought it's
a small chip somewhere on the board, not a steel case around the
machine.

Thanks

Michal


_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
http://lists.gnu.org/mailman/listinfo/grub-devel

Reply via email to