this post was submitted on 17 Jan 2025
21 points (100.0% liked)

Cybersecurity

5993 readers
107 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
 

Note this post evaluates Linux systems. Microsoft presumably has a different, hopefully better, implementation.

top 2 comments
sorted by: hot top controversial new old
[โ€“] [email protected] 3 points 3 days ago

The article-given TLDR is probably one of the worst I've seen so,

TLDR: The TPM exposes the password once the kernel boots, and you can coax it into this state by swapping out the encrypted partition with one you know the password to, in the unencrypted config file, in order to get it to that state.

[โ€“] [email protected] 1 points 3 days ago

Great post, thanks! A lot of complex knowledge broken down into simple pieces. I'm going to try to incorporate the NixOS solution into my config today.