this post was submitted on 24 Aug 2023
1 points (100.0% liked)

cybersecurity

3109 readers
12 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 1 year ago
MODERATORS
 

The vulnerability should be obvious: at some point in the boot process, the VMK transits unencrypted between the TPM and the CPU. This means that it can be captured and used to decrypt the disk.

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here