TPM (Trusted Platform Module) - Computerphile

Поділитися
Вставка
  • Опубліковано 22 лип 2021
  • With new operating systems requiring security hardware, what is this hardware and why do we need it? Dr Steve Bagley takes Sean's bet to see how many times he can mention Trusted Platform Module in one video!
    / computerphile
    / computer_phile
    This video was filmed and edited by Sean Riley.
    Computer Science at the University of Nottingham: bit.ly/nottscomputer
    Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com

КОМЕНТАРІ • 1,1 тис.

  • @FisforFenton
    @FisforFenton 2 роки тому +797

    what I really learned from this video is we can't trust Mike

    • @HamedEmine
      @HamedEmine 2 роки тому +7

      Or, you can trust Mike to point out what's wrong with you :P

    • @kippie80
      @kippie80 2 роки тому +35

      Agreed. he did make a brief mention, "if you are cynical". Well, yeah, am. Duh. He totally white-washed this. With TPM, manufacturer has way to send info to and from your computer and you can't see it. No thanks. I'll use encryption -- for sure -- but on my own terms and will trust only the physical as a root of authority. That means, when I use my own TPM, I buy from another source, add my own random number in the root, and then add to system. He totally could have got into that but no, didn't talk about TPM as a physical pluggable module. AKA : The mike has done a disservice.

    • @JosephDavies
      @JosephDavies 2 роки тому +42

      @@kippie80 It was very disappointing. Not only brushing over the severe defects in this system, but repeating the marketing hype of "it makes a system secure" as if it were true. "Secure for whom" is a crucial part of that which was left out.

    • @TomatoBreadOrgasm
      @TomatoBreadOrgasm 2 роки тому +10

      Yeah, that Mike Rosoft is one untrustworthy sneak.

    • @DiDongi
      @DiDongi 2 роки тому +4

      Mike is love, Mike is life.

  • @junofall
    @junofall 2 роки тому +1138

    Can't wait until TPM is used to enforce per-device DRM licenses.

    • @tonyman1106
      @tonyman1106 2 роки тому +163

      Do not give them ideas

    • @Bellenchia
      @Bellenchia 2 роки тому +264

      Computer-as-a-service has begun

    • @seijirou302
      @seijirou302 2 роки тому +113

      Calm down Satan

    • @busterdafydd3096
      @busterdafydd3096 2 роки тому +7

      Umm.. Alright sounds cool.. can we get it so it's bound to a flash drive. So if any device breaks we just take that with us? And we'll I hope what you mean by the DRM thing is that I can store movies on a local machine or on a computer on my local network.
      I haven't watched the video yet so personally I don't see TPM allowing DRM content being local

    • @chrisspencer6502
      @chrisspencer6502 2 роки тому +33

      Google already does a similar thing with chome the tpm on a chrome book validates the device

  • @Matt-re8bt
    @Matt-re8bt 2 роки тому +393

    TPM's sounds like the ideal method of building in a hardware backdoor to all system crypto. All undetectable to the upper-layer OS. There have been plenty of examples of using 'trusted' systems to install otherwise untrusted code, and I have no doubt that this will (or has) happen(ed) on TPM.

    • @MK--Ultra
      @MK--Ultra 2 роки тому +47

      I would bet that the NSA loves the TPM

    • @Psychx_
      @Psychx_ 2 роки тому +19

      You don't need a TPM for this. Secure boot is enough since the private keys for signing software got leaked. In theory you could rootkit a Windows (and other OSes) installation without any part of the boot process (UEFI, boot loader, operating system preloader, OS) noticing that something is wrong.

    • @absalomdraconis
      @absalomdraconis 2 роки тому +9

      Honestly, pretty much any BIOS at all can be corrupted into a backdoor.

    • @baileyharrison1030
      @baileyharrison1030 2 роки тому +22

      The intel management engine runs MINIX and is pretty well known for being a hardware backdoor.

    • @horseradish843
      @horseradish843 2 роки тому +6

      Well why start there, we already have hardware randomness on cpus and hardware crypto on cpus, so why not just implement it there instead of requiring a whole module for it

  • @itsevilbert
    @itsevilbert 2 роки тому +244

    There is a random number seed that is hard coded into the TPM in the factory, I can not see how that could ever be abused. Everybody just needs to TRUST that the factory where the Trusted Platform Module was manufactured did not keep a copy of the EPS (Endorsement Primary Seed) that was hard coded in the chip. This seed is used for generating the EK which is associated with the Endorsement hierarchy.

    • @nutbunny10
      @nutbunny10 2 роки тому +64

      Or trust that they did not send a copy to powerful interested parties

    • @thomasp4902
      @thomasp4902 2 роки тому +14

      You have trust loads of things in that chain. Although if you are trying to defend against NSA/GCHQ the TPU is probably not for you.

    • @AGENTX506
      @AGENTX506 2 роки тому +31

      This is not necessarily the case.
      In the world of software we are used to pseudorandom number generators that appear random but are ultimately deterministic and rely on a seed. In hardware we suffer no such restrictions.
      Indeed, if a TPM is being used for cryptographic functions it should contain a cryptographically secure random number generator. It's not uncommon for such generators use some physical source to generate 'true' (or at least non-deterministic) random numbers. The TPM could, for example, use such a source on first boot, write the result into a register and blow fuses to make it permanent. If done correctly then both the manufacturer and designer would have no knowledge of each chip's key. Even if such a generator has an initial seed, the next state can't be determined using it alone.
      Examples of 'true' random number sources include radioactive decay, quantum weirdness, electrical noise on supply rails, temperature/sound (e.g. tenth decimal place), etc.
      There's a whole field of research around 'physical uncloneable functions' which might also be of interest.

    • @pdan4
      @pdan4 2 роки тому +1

      They'd also have to figure out exactly whose computer it went into.... and, since you can move hard drives from machine to machine, that it was even done with the TPM in the current computer. It's not really an issue aside from manufacturer-direct prebuilt machines.

    • @adrianhartanto159
      @adrianhartanto159 2 роки тому +4

      @. I'd you are talking about silicon it is not made in China, it's in Taiwan which is a whole separate country.

  • @mheermance
    @mheermance 2 роки тому +832

    TPMs make me nervous because a hardware failure could render me unable to access my own keys and data. That seems more likely than a black hat hacker pulling off a root kit on my OS.

    • @XorYourself
      @XorYourself 2 роки тому +115

      This or the factory OTP bits used for the TPM master key are all stored in a database linked to the motherboard's serial number.

    • @jp46614
      @jp46614 2 роки тому +54

      It's pointless regardless. There are many ways of solving this problem. A password you have to provide on startup of anything that decrypts those keys would probably be the best idea since 1. You're not relying on that hardware, 2. You don't need any external hardware. I'm pretty sure this is what Linux already does with it's "Keychain" technology.

    • @GroudFrank
      @GroudFrank 2 роки тому +33

      Likelihood depends. Are you a soccer mom or are you a state senator on a national security committee? Are you a fireman or are you an engineer at Lockheed? Your viability as a target depends on what you do and what hackers want. There are many hackers who wouldn't target a state senator but would go after a soccer mom because they stand to benefit more monetarily. You never know when you're a prime target, even when you're just an ordinary Joe. Your concerns are still valid though.

    • @XorYourself
      @XorYourself 2 роки тому +7

      Real question: Does windows have a bitlocker alternative for full drive encryption? I ask because it isn't fun to enable when dual booting ... windows detects a root of trust compromise and I get to log into my Microsoft account to enter an alphanumeric phrase to log into windows to disable bitlocker drive encryption. Fun!

    • @LordNementon
      @LordNementon 2 роки тому +17

      No, if you use Bitlocker at the exception if your drive die, there are no issue to get your data back.
      The Bitlocker key is not saved inside the TPM, it use the TPM to cipher it, the ciphered version of the key is readable on the drive. Then use the TPM at boot to uncipher it and use it (i.e the cleartext key is not saved on the TMP)
      As always as Bitlocker works, obviously Windows will let you backup your Bitlocker key (nobody said you can't put your drive in an external enclosure and use your recovery key to uncipher it)
      As for information, if your Windows account is not a local one, but an online one, by default Microsoft backups your keys online for you (in others words, they backup end users as* 😁)
      So yes, no worries, IT engineers aren't dumps, Bitlocker exist for years, that's a stable product 😁
      Btw, so far Bitlocker has always been reserved to the Pro version of Windows, I'not sure it will be included by default on W11?
      Windows has a lot of different security usage of the TPM (secure boot, virtualization security based, ...)
      TPM is "just" a secure cryptographic vault, how it is used by OS(s) and software are only limited by imagination and current technology (yes secure boot is supported by Linux for years 😁)
      In all case, regarding the data, backups is the first of all rules!

  • @ojmbvids
    @ojmbvids 2 роки тому +337

    So, once we start relying on TPM, don't we basically create a single point of failure (or vulnerability)? Which even worse than usual, can't be patched to fix vulnerabilities, by design

    • @enderspirit5238
      @enderspirit5238 2 роки тому +26

      I don't think so because the alternative is to have no security at all. Without TPM, if you have physical access to the machine, you can just boot a Linux system with a USB stick and do whatever you want to the primary OS. If you manage to defeat the TPM, it just means that you go back to how stuff were done before. (At least it's how I understand it, I'm no expert)

    • @SahilP2648
      @SahilP2648 2 роки тому +2

      @@zaandam0172 yes I was using veracrypt to encrypt my SSDs, even the system partition. But TPM is better because you can use windows hello. You can buy a usb fingerprint reader for your desktop and your laptop most likely has a fingerprint or 3D face unlock. It saves time trying to type a long password.

    • @uncannysnake
      @uncannysnake 2 роки тому +48

      Thats exactly what this is. One giant centralized CIA backdoor opportunity.

    • @LordNementon
      @LordNementon 2 роки тому +5

      @@uncannysnake Since they are probably manufactured in China or Taiwan, I don't thinks so no
      May I add it is likely that Bitlocker will not be included in W11 home edition anyway, the feature has always been reserved for Windows Pro version so far
      TPM is not only used for Bitlocker, and the others kind of protection it offers, is the opposite of what you think, since it offers runtime security of the OS, CIA probably do not want it, they surely right now thinking on how to overcome Windows features that leverage them

    • @uncannysnake
      @uncannysnake 2 роки тому +22

      @@LordNementon This really is a comment beyond saving.
      >CIA probably do not want it
      If they would not love it, it would not exist. There are agreements in place that every big software and hardware manufacturer in the US must provide government backdoors. You are obviously not aware of this or doubt it is real. It is and you need to look this up ASAP to become informed.

  • @calmeilles
    @calmeilles 2 роки тому +73

    TPM, interesting, possibly useful tech.
    Making TPM obligatory… totally jerk move from corp well versed in making totally jerk moves.

  • @ZGorlock
    @ZGorlock 2 роки тому +330

    "Trusted Platform Module" count: 35

    • @petrustefanescu5842
      @petrustefanescu5842 2 роки тому +28

      35 shots it is then 🥃

    • @Einyen
      @Einyen 2 роки тому +30

      If he only had a convenient acronym to use instead....

    • @subliminalvibes
      @subliminalvibes 2 роки тому +3

      @@Einyen 🤣

    • @Wyld1one
      @Wyld1one 2 роки тому +7

      "eggs all in one basket"
      "Single point of failure"
      "Backup intolerant"

    • @luxsasha
      @luxsasha 2 роки тому

      lolololol

  • @SteelHorseRider74
    @SteelHorseRider74 2 роки тому +162

    it all comes back to trusting those chips (and their vendors) and the programmers of the software required to operate them - and it adds even more complexity to a non-trivial topic

    • @radio4active
      @radio4active 2 роки тому +10

      If TPMs get really popular there will be an open source version too where hard- and software is freely accessible. For random number generators, this already exists (see OneRNG for example). As mentioned in the video, the standard is viewable by anyone. This means if you are exceptionally paranoid, you can make your own hardware.

    • @JohnnyWednesday
      @JohnnyWednesday 2 роки тому +3

      ​@@radio4active - Hardware that will have to conform to standards that will ultimately rely on some very complex mathematics that aren't publicly known to be insecure. Black project aircraft? why not black project mathematics? haven't some older algorithms been shown to be weak? don't governments have super-computers?

    • @GC-qe8vc
      @GC-qe8vc 2 роки тому +18

      @@radio4active and indeed this is a problem. Imagine you're working for a human rights NGO that has just uncovered the Pegasus surveillance scandal, and that you want to help human rights defenders around the globe to protect themselves. You will now have to offer them a way to modify their own hardware, instead of software.

    • @flibblemarutan
      @flibblemarutan 2 роки тому +23

      So in the only person that knows what key has been burnt into the TPM is the manufacturer ... and the people and governments they share that with.

    • @1000niggawatt
      @1000niggawatt 2 роки тому +13

      it's an nsa backdoor, plain and simple

  • @sguttag
    @sguttag 2 роки тому +222

    As always...this is quite informative.
    In my industry (cinemas) we have this dreaded thing called the "KDM" (Key Delivery Message) where by a content creator is issued a certificate that allows them to make a key to allow their content to play on your server for a specified amount of time (based on a start/stop date/time)...the KDM can put restrictions, naturally on what devices may be used on the TDL (Trusted Device List) though mostly it is just the server's mediablock but it could include the projector and even the sound system, in the case of Dolby Atmos.
    My concern about TPM is from what I've experienced for over 10-years now where the security becomes a bottleneck in free-use of one's equipment. At some point, TPM will require that there is a communication between software/applications and the TPM for keys to be handed off, wrapped stored requested, used...etc. There is plenty of opportunity for legitimate systems and software to cease working or randomly work or not work and due to the security. At what point are people more concerned about the need for TPM versus their need to get things accomplished? Even such low-end security like HDCP cause no end of grief by legitimate equipment fumbling on key handoffs/repeaters and even simple sink/sources periodically blanking the screen/sound.

    • @JosephDavies
      @JosephDavies 2 роки тому +14

      Exactly! I'm glad to see some existing real-world concerns backing up the theoretical ones. I was also wondering about HDCP, and how it might interact with TPM to make something even worse.

    • @stevenclark2188
      @stevenclark2188 2 роки тому +14

      The nature of PCRs is such that they really aren't practical past the point where software stops executing in a predictable order. So they're great for measuring the security state of the boot process for unsealing a disk encryption key but nearly useless for most of the DRM nightmare scenarios that were predicted by the FSF (and resulted in the tools in Linux being several years behind those on Windows). Also the policy language for TPM2.0 is specifically pretty complicated to make it possible to write robust policies that are updateable to deal with upgrades to the system.

    • @jacobscrackers98
      @jacobscrackers98 9 місяців тому

      Aren't you already trusting your CPU not to do that?

  • @Gooberslot
    @Gooberslot 2 роки тому +240

    You still have to trust the root key. I don't trust any key I haven't generated myself.

    • @xdevs23
      @xdevs23 2 роки тому +11

      this

    • @leviathan7477
      @leviathan7477 2 роки тому +18

      When was the last time you generated a key with pencil and paper? 😈 just teasing. But actually my brother worked on a security device that works in this way and the “root key” was not generated by the manufacturer, it was actually derived from the physical characteristics of the silicon itself which guaranteed it to be truly random and truly unalterable/unable to be replicated. I don’t know anything about the TPM spec, but I wonder if it’s doing something similar 🤷🏻‍♂️

    • @m5w5
      @m5w5 2 роки тому +20

      @@leviathan7477 oh, this sounds like a PUF (physically uncloneable function). They're quite interesting, and I got to learn a little about them this past spring. The basic principle is that you send a PUF a challenge, and it gives a response. One example of this is a metal resistance PUF. You have an array of metal interconnects on the chip, and the challenge is used to select one of them. There is a higher voltage at the top of the metal interconnect and a lower voltage at the bottom. The greater the resistance of the interconnect (which is determined by manufacturing variations), the lower the bottom voltage. Each voltage is used to power a separate long chain of inverters. A pulse is generated at the start of the bottom inverter chain, and after a small delay, it is also sent to the top inverter chain. Because the top inverter chain is powered by a higher voltage, the pulse will propagate down it faster and eventually pass the pulse still propagating through the bottom chain. The chip measures how many inverters it takes for this to happen and uses this number to produce the response. The idea of PUFs in general is that an organization records responses to many selected challenges during an "enrollment" phase and then later, during normal operation, can send those same challenges to the device in the field and check its response to verify that it is actually the device (and not someone trying to impersonate it). In practice, this is difficult, because physical characteristics of silicon change depending on temperature and voltage, but there are ways to compensate for this (essentially by using a few bits of helper data to "error correct" the response to the one recorded during enrollment). My professor was somewhat skeptical of PUFs, though. Who's to say physical characteristics of silicon are truly random? With a better understanding of the manufacturing process and device physics, perhaps we will be able to correlate manufacturing variations in one part of a chip with variations in another and predict PUF responses.

    • @MorgothCreator
      @MorgothCreator 2 роки тому

      Agree

    • @SamGib
      @SamGib 2 роки тому +2

      @@m5w5 Base on your description of a PUF implementation, how to avoid replay attack when the challenge is always the same?

  • @simeondermaats
    @simeondermaats 2 роки тому +157

    Moments like 1:51 is what make these videos brilliant.

  • @randomscribblings
    @randomscribblings 2 роки тому +45

    "In a nutshell" a TPM is admitting that we've failed at security, that we're not going to even try, and we're going to use it as a convenient excuse to identify and restrict your use of your PC.

    • @mr_waffles_the_dog
      @mr_waffles_the_dog 2 роки тому

      Nah, TPMs are an important part of platform security, and a properly designed one should not leak trackable information into user space, but they're solving separate problems

    • @randomscribblings
      @randomscribblings 2 роки тому +5

      @@mr_waffles_the_dog And a properly designed one shouldn't have a problem with complete user control, but I don't really see evidence that this "important part of platform security" is being designed with users owning their own system in mind. In fact, everything I've read so far is that it's often going to be used in controlling what the user can do.
      My comment, however, was addressing the fact that appropriate security at the OS level would eliminate the need for this implementation of TPM --- and the fact that we'd failed at that is why some in the community are acquiescing to their existence.
      The next (or the current) challenge in computing is: "who _really_ owns your computer" ...

    • @mr_waffles_the_dog
      @mr_waffles_the_dog 2 роки тому +1

      @@randomscribblings Appropriate security at the OS level *cannot* stop someone with physical access to the machine, the TPMs address that attack vector, they further isolate important keys from the OS itself. Which is a defense against the OS itself being compromised.
      I can't speak to PC TPMs but on a Mac you can disable trusted boot at a partition/OS granularity. Disabling it requires access gated by the SEP in a separate boot mode, and toggling protection effaces a bunch of critical keys (things like the credentials for Apple Pay, Touch ID, etc).

    • @randomscribblings
      @randomscribblings 2 роки тому +3

      @@mr_waffles_the_dog Meh. Secure boot doesn't require TPM. With public key crypto, the OS simply doesn't boot an unsigned OS. This is a red herring and not an interesting use of TPM. We've had secure boot for awhile _without_ it requiring TPM. Secure boot is simply a gateway drug to get you to accept TPM.
      Similar to the OS being hacked, TPMs don't really address the OS asking the TPM to sign things that shouldn't be signed. A compromised OS is catastrophic for security. And by asking it to sign chosen plaintexts, it could quietly use the system's on GPU (say) to hack on the security of the TPM itself.
      But simply put: secure boot can be easily solved without TPM. TPM doesn't solve new problems ... unless the problem is user control.

    • @randomscribblings
      @randomscribblings 2 роки тому +1

      Heck... secure boot can be solved (even) with read-only media. Did that back in 1995 with CDROM internet-router images as a product.

  • @frognik79
    @frognik79 2 роки тому +59

    Those boys at Chaos Computer Club / Black Hat are going to have a field day.

    • @recklessroges
      @recklessroges 2 роки тому +18

      Yes! This just screams "Multiple future Blackhat talks" and at least one wikihow on "replace your TPM with the number "4" [selected using the fair role of a die.]"

    • @flak714
      @flak714 2 роки тому +6

      They've been having a go at TPMs for over a decade. There's been the odd talk about poor implementation from manufactures (e.g. ROCA, TPM fail), but that's nothing new in the security domain. TPMs have a really strong record for doing what they're designed to do and nothing more.

    • @JDines
      @JDines 2 роки тому +1

      Ah yes ... Mentioning the CCC reminds me of the 80s when Mudge and L0pht Heavy Industries. Those guys were the bomb in the day.

  • @ytube777
    @ytube777 2 роки тому +141

    Is the "root key" burned into the tpm and unchangeable? Is "Secure Boot" related to the tpm? Can you do a video on "Secure Boot". Why do linux distros need to have microsoft sign their "bootloaders"?
    IMO, it sounds like in order to trust the tpm, you need to trust the person that generated the "root key". If that person is not you, then you can't claim it's security in your interest. It's like the browser trusted root authorities regime... faced with advanced state actors, it provides zero security.

    • @Oquasinus
      @Oquasinus 2 роки тому +20

      Yes to both -- there's a TPM-unique secret key set by the chip manufacturer, and TPM is used to implement UEFI Secure Boot. And it's not only your opinion, but simple fact that one would need to trust the TPM manufacturer, ain't that grand?

    • @DerUnbekannte
      @DerUnbekannte 2 роки тому +21

      @@Oquasinus ah yes, let's distrust the hardware manufacturer, you're so smart.
      you're now using an abacus, congratulations

    • @thisisneeraj7133
      @thisisneeraj7133 2 роки тому +7

      All vendors are idiots just need money they don't care if someone loses their data or compromise thier credentials

    • @Oquasinus
      @Oquasinus 2 роки тому +41

      @@DerUnbekannte Of course you have to trust the hardware to not contain backdoors. I merely pointed out that a technology specifically meant for security doesn't give any if its main key is determined by a third party. What are you arguing for?

    • @DerUnbekannte
      @DerUnbekannte 2 роки тому +8

      @@Oquasinus the question is what are *you* arguing for. if you think hardware is compromised, then that's already the case now.
      how would adding tpm's be less secure?
      for the vast majority of cases, a tpm strengthens the security model considerably.

  • @Oquasinus
    @Oquasinus 2 роки тому +168

    Isn't this all a ploy to get more Digital Restrictions Management and licence enforcement into our machines? Apart from the obvious (EDIT: comparatively minor) problems of the vendor-supplied Endorsement Key with which the computer can be uniquely identified. I'm not really keen on having 'security' with keys and dedicated chips outside of my control.

    • @DerUnbekannte
      @DerUnbekannte 2 роки тому +10

      >with which the computer can be uniquely identified
      I have some bad news for you bud :(

    • @JohnnyWednesday
      @JohnnyWednesday 2 роки тому +31

      More like a plan for a few billion TPM keys generated in a factory to be given to the NSA so they can dictionary crack any communication.

    • @Oquasinus
      @Oquasinus 2 роки тому +7

      @@DerUnbekannte As in the other thread, just wanted to say that the identifiability is not really what I'm bothered about, since there's already many ways to fingerprint a system.

    • @LordNementon
      @LordNementon 2 роки тому +1

      And what make you think that?
      You can go for a Linux system, but even there not using a TPM and secure boot is today, was yesterday and will even be more tomorrow an extremely bad idea
      It's long time Microsoft let you run it's OS without activating it, it just borrow you some recall messages as WinRAR does, but what the point of not paying your Windows license?

    • @McTavish1234567890
      @McTavish1234567890 2 роки тому +1

      Of course it is

  • @GJ203
    @GJ203 2 роки тому +93

    If the keys are encrypted in hardware, wouldn't that make everything unreadable if you have to switch motherboards?

    • @mr_biscuit
      @mr_biscuit 2 роки тому +25

      Well, the tpm isn't in the motherboard, it's located in the cpu or plugged into a header on the motherboard. But yes if you were to change the cpu or the chip then it would be unreadable.
      The way you avoid this is by decrypting all the data before you change the cpu or tpm, then rencrypt it again after you change parts.

    • @clone54
      @clone54 2 роки тому +8

      This is probably what the recovery key is for.

    • @Michael75579
      @Michael75579 2 роки тому +32

      @@mr_biscuit Which is fine, if annoying, if it's a planned update, but what happens if my motherboard fails and I have to replace it without being able to decrypt everything first?

    • @t_z1030
      @t_z1030 2 роки тому +11

      Initially yes, but you get a recovery key when you encrypt your Windows drive. On a new motherboard, you get prompted to enter the recovery key which then gets stored in the TPM and is used to decrypt the drive.
      Lots of people are unnecessarily freaking out about this, but TPM based Bitlocker drive encryption has been a thing in Windows for a long time, primarily used in enterprise. I use it myself, and have had no issue in the past taking a Bitlocker encrypted drive, putting it into an entirely different system and booting it up with the recovery key.

    • @GJ203
      @GJ203 2 роки тому +3

      @@t_z1030 how does a recovery key work with encryption in hardware if the hardware used to decrypt isn't known at the time the recovery key is created?

  • @GT-tj1qg
    @GT-tj1qg 2 роки тому +32

    So glad that Computerphile decided to cover this topic. I found the video somewhat useful, but it doesn't clearly explain the full topic. Either that or TPM's are a flawed idea, cos it seems like just begging the question

    • @paulstelian97
      @paulstelian97 2 роки тому +5

      All the security in the TPM is that you cannot do any non-destructive attacks to extract the root key, or bypass the need to do so in order to extract any other information from it.
      Userspace programs won't use the TPM for much really, they'd ask the operating system to do the encryption and everything. The TPM doesn't come into play for regular application developers. OS kernels, bootloaders and bare metal hypervisors are the only clients.
      Bitlocker. I've noticed that booting Windows through Grub when I initially set it up directly will fail the check and force me to insert the recovery key (or to shut down)

  • @squishmastah4682
    @squishmastah4682 2 роки тому +37

    "Some dodgy geezer called Mike."
    Shots fired. And careful. Mike's already done all his arm exercises.

    • @leifmessinger
      @leifmessinger 2 роки тому +1

      "I only joke, Mike doesn't use that web address to catch people's keys; He uses a different one."

  • @jandraelune1
    @jandraelune1 2 роки тому +164

    This will make changing drives and MoBos a nightmare. Don't setup both ends right for a hardware change, you now lock yourself out of access. Gone is simple hardware swaps.

    • @soylentgreenb
      @soylentgreenb 2 роки тому +36

      Absolutely. I forsee a lot of irretrievable irreplacable files destroyed due to this. It's just a matter of time before someone permanently loses access to crypto coins, family photos, receipts and videos and so on.

    • @prestonferry
      @prestonferry 2 роки тому +22

      @@soylentgreenb this is why I hate Microsoft… I highly doubt it will happen but I really do hope Mac/Linux prevails…

    • @JayVal90
      @JayVal90 2 роки тому +53

      @@prestonferry Mac? You can’t replace any hardware on a Mac.

    • @prestonferry
      @prestonferry 2 роки тому +4

      @@JayVal90 yeah, but Apple isn’t as snarky and proprietary on Mac… You still have a little bit more control over the system and it’s also way more secure and durable than Windows is… Even if you can’t interchange parts I think it’s still more trustworthy…

    • @EtienneMaheu
      @EtienneMaheu 2 роки тому +57

      @@prestonferry On Macs, you quite literally have the exact same problem that @Jandra Elune said in their original comment. If you remove the SSD on a mac, you basically brick the machine because of the T2 chip. Remember how iPhones refuses to boot if you replace the camera? How do you think this is accomplished... If anything, they are _way_ more snarky and proprietary because you can't even buy a new T2 chip if it breaks. Anyone can buy a new TPM or SSD if they want to and installing them is trivial. You can even take a compatible TPM to a new machine, with the same drive, and keep all of your data encrypted in the process.

  • @justpaulo
    @justpaulo 2 роки тому +48

    What stops Mike (the villain of course) to send me a software that in background asks the TPM to unwrap my private key?

    • @MorgenPeschke
      @MorgenPeschke 2 роки тому +10

      Or exploit the TPM to add a trampoline to return it's key when asked to wrap 0xdeadbeef, disable sealing keys, wait a week, and then exfiltrate all your (now unsealed) keys through other, more easily exploitable software?

    •  2 роки тому +4

      Probably the operating system will set things up so that only it can talk directly to the TPM, and that arbitrary software can't. The OS will of course try to only talk to the TPM in a secure way. Then UEFI Secure Boot is supposed to be used to ensure nobody has tampered with the operating system itself.

    • @jetjazz05
      @jetjazz05 2 роки тому +10

      @ If man can make it man can break it. This sounds like the "chip" credit cards, they cracked that within a week of it being on the market...
      What this is REALLY about is letting Microsoft control your computer so they can encrypt and send anything to themselves from your computer they want without your knowledge. You HAVE to hand over the encryption abilities hardwired into your computer to windows meaning they can do whatever they want without your knowledge. There's a cost for Windows being "FREE", and it's losing the last shreds of privacy you had.

    • @ubermidget2
      @ubermidget2 2 роки тому +16

      @@jetjazz05 Dude, they make the OS
      Having a TPM isn't going to magically mean they can access more of your data.
      If they want, they can already access all of your data

    • @blenderpanzi
      @blenderpanzi 2 роки тому +5

      Looks like eventually OS vendors want to limit what programs you can run. (Also for DRM reasons.) More or less like macOS already does, except for now their fallback is to just run the program.

  • @Crackalacking_Z
    @Crackalacking_Z 2 роки тому +64

    Tying the OS to the hardware, can't wait for MS to brick a few million PCs with their ham-fisted efforts.

    • @UltimateAlgorithm
      @UltimateAlgorithm 2 роки тому +1

      In case you don't aware, MS is the one playing catch up here with TPM thingies.

    • @trinidad17
      @trinidad17 2 роки тому +1

      @@UltimateAlgorithm Great MS is just one of the evil players. Best defense, Pol Pot did nothing wrong there were those other guys too that did it before.

  • @HebaruSan
    @HebaruSan 2 роки тому +47

    Virtualization can make the boundary between hardware and software fuzzy, wonder how that plays into this. Will a hosted system be able to tell whether it's talking to a real TPM?
    What happens when your friendly neighborhood ransomware vendor takes over your TPM? Do you get to use your computer again ever?

    • @Faladrin
      @Faladrin 2 роки тому +5

      The TPM is implemented in hardware and presumably has no persistent storage. There is nothing to take over.
      As for VM's there is no real concern. If a guest OS gets pass-through access to a real TPM, great, then the guest OS can enjoy the benefits of increased security. The guest OS is just software running on the host OS. That guest OS can only impact the security of the host OS in the same way that all other software on the host OS could. If the guest OS is only given a software TPM then that could be an issue for the guest OS, but I would wager in most cases the user would be aware of this and the consequences are on the user.

    • @DFX2KX
      @DFX2KX 2 роки тому +1

      @@Faladrin TPMs do have some persistent storage, but yeah, there's not much to take over on one.

    • @stoneskull
      @stoneskull 2 роки тому +4

      @@Faladrin i thought he meant spoofing the tpm. if the system thinks it's talking to the real tpm but it's really a tricky program taking over the role.

    • @johnnylavoie
      @johnnylavoie 2 роки тому +1

      The hosted system is able to know if the TPM is the same as the one before, because it cannot unencrypt without this. Man in the middle attacks are possible, but the TPM can help provide the check to prevent somes. Ransomware have way easier attack vectors than spoofing drivers levels components.

    • @therobb5738
      @therobb5738 2 роки тому

      I have Windows 11 running on a VM with not a hint of TPM issues, or from a lack of one.

  • @chesshooligan1282
    @chesshooligan1282 2 роки тому +111

    I don't trust the Trusted Computing Group.

    • @vagraadam
      @vagraadam 2 роки тому +8

      Well, you can trust them, but not necessarily the vendors who will build them, again think about the android phones that had viruses on them out of the factory.

    • @JohnnyWednesday
      @JohnnyWednesday 2 роки тому +12

      The government don't trust us and they ask us to trust them.

    • @MorgothCreator
      @MorgothCreator 2 роки тому

      Agree

    • @Roxor128
      @Roxor128 2 роки тому +7

      The Free Software Foundation has a much more accurate name: Treacherous Computing.

  • @ornessarhithfaeron3576
    @ornessarhithfaeron3576 2 роки тому +38

    2021, the year of the Linux desktop

    • @Roxor128
      @Roxor128 2 роки тому +3

      2019 was my year of the Linux desktop.

    • @user-hd8tg4em2n
      @user-hd8tg4em2n 2 роки тому +2

      @@Roxor128 I've been using linux for years, full disk encryption.

    • @pladimir_vutin
      @pladimir_vutin 2 роки тому +2

      Hallelujah!

    • @6500s1
      @6500s1 2 роки тому +2

      This. Can confirm, 5 months of Linux, never been happier, and I've been on Windows for over 20 years, even had the chance to witness the one version before 95, whatever it's called, lol.

    • @Roxor128
      @Roxor128 2 роки тому +1

      @@6500s1 Probably Windows 3.1 if it had sound support. 3.0 if it didn't.

  • @roberttalada5196
    @roberttalada5196 2 роки тому +22

    This is still just moving the problem. This will be compromised.

    • @roberttalada5196
      @roberttalada5196 2 роки тому

      Except you are wrong. Perfect security can and does exist. Data transmission by quantum entanglement is a great example but there are easier to implement security schemes that simulate this principle.

    • @gravityhatfilms
      @gravityhatfilms 2 роки тому +7

      ​@@roberttalada5196 Except, that is also wrong. If someone compromises the supply chain of your quantum entanglement system then you run into the same issue with compromising the TPM.

  • @enire8477
    @enire8477 2 роки тому +18

    Im sure it a dumb question, but if the computer is compromised by Mike, why cant he retrieve the key before it gets sent(or on route) to the TPM to be encrypted?

    • @DFX2KX
      @DFX2KX 2 роки тому +1

      That's an attack that is possible. but you'd have to have already compromised the system. some of the imporant keys are set up before the system connects to the internet for the first time.

  • @ss-xy2im
    @ss-xy2im 2 роки тому +68

    So if your motherboard dies ur data goes with it, amazing solution 🤮

    • @DFX2KX
      @DFX2KX 2 роки тому +6

      That's what the backup keys are for. You really DON'T want to loose those, tho. They exist for Linux Full Disk Encryption as well.

    • @ss-xy2im
      @ss-xy2im 2 роки тому +20

      @@DFX2KX u cant back up tpm keys as u cannot read them! If the chip is gone all is lost! Luks is perfect dont need tpm

    • @jfangx
      @jfangx 2 роки тому

      Trust me, if something cant be accessed someone will find a way; it may only be in person but it had to be written to a chip at some point, so it can be read from and rewritten to again.

    • @LordNementon
      @LordNementon 2 роки тому +4

      @@ss-xy2im Bitlocker key are not saved inside the TPM, they are ciphered by the TMP.
      The ciphered keys is readable on the disk
      Obviously any Bitlocker users will have access and will backup the secret or recovery key of their drive (you can looks on how Bitlocker works for more information)
      Bitlocker has always been only for Windows Pro users and will surely not changed with W11
      TPM is not only used for Bitlocker (Secure boot, Virtualization Based Security)
      So no, you motherboard die, no issue with your drive data
      But if you drive die and you do not have backups, yes you will be screwed

    • @paulstelian97
      @paulstelian97 2 роки тому +1

      @@ss-xy2im Backup key is a second copy of the Bitlocker key that is not sealed by the TPM but usable directly.

  • @chrisfreemesser5707
    @chrisfreemesser5707 2 роки тому +110

    Security and usability are an inverse relationship. The more security that gets implemented in computers the more important it becomes to have a backup or three (preferable air-gapped) of your data someplace for when the computer suffers some sort of corruption or failure and everything becomes unrecoverable.

    • @jetjazz05
      @jetjazz05 2 роки тому +9

      welcome to RMAing your mobo and losing your f'king life.

    • @simontay4851
      @simontay4851 2 роки тому

      Somewhere

    • @thomasp4902
      @thomasp4902 2 роки тому +3

      @@jetjazz05 Aka buying an Apple laptop

    •  Рік тому +1

      -usability- convenience ("usability" is too broad a term here)

  • @Ojisan642
    @Ojisan642 2 роки тому +5

    I normally love these videos, but this was the most convoluted explanation of how the TPM works, and I already understand it. And this is a rare case where the graphics did very little to help.

  • @tonyman1106
    @tonyman1106 2 роки тому +26

    The only person you can trust to encypt your data is your self.

    • @mosti72
      @mosti72 2 роки тому

      But can you really trust yourself?

  • @unvergebeneid
    @unvergebeneid 2 роки тому +76

    Are we not going to talk about the history of Microsoft pushing the TPM with Palladium back in the Windows 8 days? Yeah? Nah? Okay, cool. Cool.

    • @enochliu8316
      @enochliu8316 2 роки тому +4

      TPM2.0 required for Win10 certification of new computers, yep.

    • @JosephDavies
      @JosephDavies 2 роки тому +43

      It's very shady to not discuss the history of the TPM and what the intentions are of those who seek to make it widely available.

    • @unvergebeneid
      @unvergebeneid 2 роки тому +7

      @@JosephDavies I didn't really expect a very critical video though when I saw the guest. Still disappointing.

    • @nachik09
      @nachik09 2 роки тому +5

      You again? Palladium is not TPM. TPM is an open standard and a general purpose crypto module. Palladium was not.

    • @unvergebeneid
      @unvergebeneid 2 роки тому

      @@nachik09 haven't we been over this? What does it matter, that the standard is open? Palladium was built on TPM.

  • @NezzConstantine
    @NezzConstantine 2 роки тому +40

    I feel like what I am hearing is that if my computer dies for some reason, all my data on the hard drive is SoL and irretrievable by software? Am I wrong? If so, I don't want that.

    • @enochliu8316
      @enochliu8316 2 роки тому +5

      Bitlocker recovery keys save the day, as they always have. And you do want that if an attacker gets your hard drive.

    • @VincentGroenewold
      @VincentGroenewold 2 роки тому +4

      @@enochliu8316 Which negates the security of bitlocker and the tpm a bit, right? It means there is an attack possible from that side. I do have it configured that way, because you can take security so far it totally becomes impractical and prone to what Nezz mentions.

    • @EtienneMaheu
      @EtienneMaheu 2 роки тому +5

      It depends.
      The way Apple did it, yes, 100%. It is soldered on the motherboard that that's that.
      If your PC has an embedded TPM, then you're in the same boat. If your PC has a separate TPM that you can remove, then you can put it in a new compatible computer and decrypt the drive. Depending on if you enabled secure boot or not, you might even be able to boot into Windows just fine.
      In practice with Windows 11, secure boot is also required, so your TPM will refuse to release the keys to your drive.
      In the end though, if your computer dies, it is very likely that your drive is to blame. SSDs have write limits, HDDs have mechanical components. Outside of fans and batteries which do not interact with the TPM, they will be the first to fail under normal circumstances. In other words, you should have an (encrypted) offsite backup of your data anyway.

    • @LordNementon
      @LordNementon 2 роки тому +2

      If your HDD die for some reason, all your data are irretrievable ..., If your computer is infected by a ransomware some how, all your data are irretrievable, if ... just do (securly encrypted) backups, and start now 😉

    • @soylentgreenb
      @soylentgreenb 2 роки тому +2

      @@LordNementon Negating the security provided by the TPM as those secure backups require the key to unlock them to be stored somewhere in a format that does not rely on the TPM.

  • @bunkenator
    @bunkenator 2 роки тому +21

    And this TPM is of course 100% open source so we can all verify precisely how trustworthy it is and that it doesn't leak any information that is not chosen by us or the NSA, right?

    • @enochliu8316
      @enochliu8316 2 роки тому +3

      Yep. The reference implementation is BSD licensed.

    • @VictorYarema
      @VictorYarema 2 роки тому +1

      @@enochliu8316 so you say that preinstalled key is BSD-licensed? Is reference implementation the one an average person will get in their PC? Don't bother answering.

  • @XorYourself
    @XorYourself 2 роки тому +21

    Have TPM built in keys ever been supply chain compromised? What is stopping the TPM manufacturer from recording which key is written to the OTP bits on chip xyz0001 ?

    • @cmxpotato
      @cmxpotato 2 роки тому +1

      They could, but then is that machine any less secure than a computer without a TPM?

    • @oivinf
      @oivinf 2 роки тому

      @@cmxpotato I can't believe how many people in this comment section don't understand the fundamentals of TPM, because you're absolutely correct. If TPM is compromised you're just back to not having TPM. It should only be _one_ layer of security, not the _only_ layer

    • @michaels8297
      @michaels8297 2 роки тому

      @@oivinf how do you recommend operating a PKI? If you were to deploy some IoT devices...what hardware would you use. Would you operate your own CRL and Certificate lists to manage the x509 certs? Would you conduct your own initial provisioning of devices? How would you boot an IoT device securely? What if the IoT device doesnt have an OS? I understand these are very open ended questions, but I am curious about your take on any/all of these questions.

    • @VictorYarema
      @VictorYarema 2 роки тому +1

      @@oivinf could you please just stop lying. It is not just one layer. Simply because nothing stops anyone to "use it as the only layer and ignore the others". This is just a tiny fragment of set of issues one may have with TPM. And I will not waste my time explaining why exactly all of a sudden so many security experts, whistleblowers, ... never said a single word about the need for everyone to have "some dedicated hardware security life saver".

    • @VictorYarema
      @VictorYarema 2 роки тому

      @@michaels8297 what is the point of asking a person about security if that person either intentionally lies or doesn't know basic things about it?

  • @PS-vk6bn
    @PS-vk6bn 2 роки тому +30

    What happens if the TPM chip fails/goes defect, then you can say bye bye to all your encrypted data and DRM licenses, since a backup of the stored secret key isn't supported!?

    • @Seegalgalguntijak
      @Seegalgalguntijak 2 роки тому +7

      Then all your data is screwed.

    • @ghume79
      @ghume79 2 роки тому +11

      I see a lot of with this TPM. Non-technical individuals are going to put themselves in world's of problems.... :-(

    • @Seegalgalguntijak
      @Seegalgalguntijak 2 роки тому +4

      ​@@ghume79 It's another nail in the coffin of universally usable computers which can run any kind of code that you would like them to run. Look up Cory Doctorow's talk about it, it's almost 10 years old now, but still highly up-to-date in a way...

    • @cronchcrunch
      @cronchcrunch 2 роки тому

      Windows gives you a backup key, so even if you put your drive into a new computer with a different CPU/MB/TPM you can still decrypt your drive.

    • @farrongoth6712
      @farrongoth6712 2 роки тому +8

      @@cronchcrunch Not if the TPM chip itself goes defunct, otherwise they are admitting to having a backdoor.

  • @askcompu
    @askcompu 2 роки тому +68

    seems like this could make hardware upgrades difficult/impossible without reinstalling windows

    • @radio4active
      @radio4active 2 роки тому

      Not if the module is of the plug-in type.

    • @SahilP2648
      @SahilP2648 2 роки тому

      It's really not. All you need to do is backup your windows using your windows 7 backup tool, and then open recovery and then choose restore using image. Might not be exact in the naming sense but you will basically have to do that. And, this is only required if you change your motherboard, otherwise not.

    • @t_z1030
      @t_z1030 2 роки тому +3

      @@SahilP2648 You don't even need to do that. Windows gives you a recovery key when enabling drive encryption. If you change your hardware, you are prompted for the recovery key at boot time. Type it in, it gets stored in the new TPM, Windows boots, job done.

    • @SahilP2648
      @SahilP2648 2 роки тому

      @@t_z1030 oh I see. Nice and thanks.

    • @stoneskull
      @stoneskull 2 роки тому

      @@t_z1030 keep your password away from mike

  • @GGanon
    @GGanon 2 роки тому +3

    I have some (hopefully) constructive criticism about the way the first half of this video was done. If you disagree with me please do reply... I'd love to find out if this is just me (I have a question at the end of this comment for anyone reading this)
    I liked this video and I understood everything that was explained but that's because I've recently done some casual reading about TPMs and how they're used and about the chain of trust when booting up your OS. So that made it easy for me to follow along with everything in this video because it was mostly just me going "oh yeah, I remember reading that" and just nodding along.
    But I feel like a lot of the stuff explained especially in the first 3-4 minutes of the video - where Dr Steve is setting the scene of how different solutions for "keeping the key a secret" are actually just moving the problem up a few layers and **why** we need a TPM - are kind of rushed over quickly in a couple of short sentences with some quick and not very clear (albeit funny) graphics of Mike.
    For example: Dr Steve explained how someone could modify the OS to send the key to a malicious 3rd party. Or how the firmware could be modified to skip checks that verify the OS was not tampered with in any way and had malicious code inserted in it (I suppose he's referring to the secure boot feature? Not sure..). All of these concepts were rushed over in a few very quick sentences in one or 2 breaths. Maybe that part of the video could have been explained a little slower so that it could really help the audience understand the problem?... especially audience members who have never even thought about or read about stuff like full disk encryption and storing decryption keys on the system and the different ways someone could try to steal them (and therefore, why we even have things like secure boot or TPM in the first place).
    I feel like someone with less knowledge would just be left confused after listening to all of those very quick points and not really leave here with a proper understanding of WHY we need a TPM.
    The reason I'm writing this comment is actually because this isn't the first time I've felt this way about a computerphile video. There were a couple of times where I noticed how some arguably important parts of the explanations were rushed/mumbled over with very little diagrams/graphics and it left me more confused and unable to keep following along with the rest of the video because of all the questions in my head. Sometimes the videos just help re-enforce knowledge for someone who already had a basic understanding about the video's topic beforehand, but it doesn't really help someone who's new to the topic understand it very well (unless maybe they re-watch the video a couple of times).
    But maybe I'm overthinking this so I have an open question to anyone reading this comment. If you are someone who has a basic understanding of encryption but wasn't really aware of TPM or secure boot or anything else about storing a decryption key safely on a computer... after watching this video, did you feel like it painted a clear picture and answered your questions about what a TPM is and why we need it? Or did you end up more confused than when you first came here.

    • @Kikikan
      @Kikikan 2 роки тому +1

      I know what encryption is, didn't know a lot about TPMs and secure boot and my answers have been answered by this video.

    • @paulstelian97
      @paulstelian97 2 роки тому +1

      I for one had the intuitive knowledge of what TPM does to Bitlocker, and this video just reinforced and clarified that and allowed me to confirm the fact that the Apple T2 is just a TPM without the TPM API.

  • @YuanLiuTheDoc
    @YuanLiuTheDoc 2 роки тому +1

    Fascinating talk! My takeaway is: TPM transforms the task of "hiding" (securing) a single key into hiding multiple parameters. "Mike" has to work harder to determine how many and which key-value pairs are used to seal the TPM key. Because such parameters are set individually on each system, the reward of such labour also diminishes geometrically.

  • @KeithWilliams73
    @KeithWilliams73 2 роки тому +13

    So, with an active TPM, any sort of hardware failure will result in you losing pretty much everything? Be that a TPM failure, or motherboard, CPU, HDD etc. Sounds like a great idea, but also the cause of heartache.

    • @Tahgtahv
      @Tahgtahv 2 роки тому +2

      Not necessarily. Most home users don't do full drive encryption. Just because you have an active TPM doesn't mean "whoops, every single byte of data you now have is encrypted now and forever". The Microsoft technology that does this is called BitLocker (can be used in conjunction with a TPM or not). If you have data that is "precious", or "irreplaceable", but not "secret", just store it in a place (or more than one) that isn't encrypted.

    • @JohnnyWednesday
      @JohnnyWednesday 2 роки тому +4

      one man's heartache is another companies new sale.

    • @AdamReece87
      @AdamReece87 2 роки тому +5

      If you keep your recovery key, like the Bitlocker process insists you do so safely (and won't even begin until you make a resonable attempt at one method), then you lose nothing.

    • @DFX2KX
      @DFX2KX 2 роки тому +1

      I've had a hard drive failure eat years of data before. And it wasn't encrypted. Keep backups, multiples preferably.

    • @namehidden8854
      @namehidden8854 2 роки тому +2

      @@AdamReece87 This process sounds like it will be very easy to teach my grandmother and grandfather. Isn't it great how user-friendly, accessible, and stable Windows is these days?

  • @dantheman1998
    @dantheman1998 2 роки тому +3

    I can see this as a way to lock a program from being modified. If you go to modify a program with mods or to look as the assets or just poke around, the TPM can lock you out of even just looking at it on your own PC.

  • @TheNefastor
    @TheNefastor 2 роки тому +6

    And as soon as pirates find a way to spoof a TPM in software, the whole thing will become just another vulnerability.

  • @fluffymcdeath
    @fluffymcdeath 2 роки тому +25

    Ransomware will love these things.

    • @oivinf
      @oivinf 2 роки тому +1

      Quite the opposite, actually. Unless you're talking about the attacker physically installing a chip in your computer, then yes. But at that point, they're so deep into your stuff that they could just take whatever they wanted to anyway.

    • @fluffymcdeath
      @fluffymcdeath 2 роки тому +4

      @@oivinf Single point of failure. If the OS can set keys then there will be an exploit that an do it too. And everything will be gone, instantaneously.

    • @mosti72
      @mosti72 2 роки тому

      @@fluffymcdeath that is why secure boot is a thing

  • @scaredyfish
    @scaredyfish 2 роки тому +10

    Does Intel, or whoever manufactured the chip, potentially have a record of the TPM encryption key?

    • @OpenKeith
      @OpenKeith 2 роки тому +5

      it's quite plausible

    • @MagicPlants
      @MagicPlants 2 роки тому +1

      It'd be pretty dumb to generate a key and then just pitch it off into the universe with no backup. Perhaps the client might need it again? Do you trust the bank not to spend your money? Why?

    • @jhonbus
      @jhonbus 2 роки тому +8

      The chip manufacturers already know about all the undocumented processor instructions they built into your CPU that would allow them or whoever else knows about them to access and manipulate every bit of information in every part of memory, cache or register on your system any time they like, so if trusting them is a problem for you I hope you're not using a modern processor.

    • @TheOzumat
      @TheOzumat 2 роки тому +7

      @@MagicPlants the bank literally does spend your money though, they just don't remove it from your account.

    • @soylentgreenb
      @soylentgreenb 2 роки тому +1

      @@MagicPlants I trust the bank to spend my money because that's what they say they will do (hint: You're lending the bank money to do with as they please; you don't have "money in the bank", you have a promisory note from the bank to repay you; for this you used to be provided with 3-4% interest yearly, but now you lend them money for free. Thank the fed or your national equivalent)

  • @mytube001
    @mytube001 2 роки тому +30

    Poor Mike! :)

    • @simeondermaats
      @simeondermaats 2 роки тому +4

      If anything, poor us; all _our_ keys are pwned :P

    • @DrSteveBagley
      @DrSteveBagley 2 роки тому +12

      No Mikes were harmed in the making of this video…
      Their reputations on the other hand… :-)

  • @InterCity134
    @InterCity134 2 роки тому +35

    Hmmmm just seems like a shell game of pushing the problem until you no longer know where the problem is, but it’s still there.
    If my legit software running on Windows can ask the TPM to decrypt the stored key for use, why can’t software that has compromised and gained execute permission on the system also just do that as well: ask the TPM to decrypt?
    Some software row hammers or in other ways gains access to a bit of memory it shouldn’t access and now has a key that is TPM protected. What keeps that malware from just using the TPM to decrypt ?
    The added points of failure are a bit worrisome because they were not explained: if I get a new motherboard or CPU , now will I. I longer be able to access my encrypted keys ?

    • @zyansheep
      @zyansheep 2 роки тому +2

      I guess TPM is just for preventing various physical methods for extracting keys, as opposed to preventing misuse by the OS itself. If the OS is compromised, there is not much a TPM can do.

    • @lubricustheslippery5028
      @lubricustheslippery5028 2 роки тому +13

      @@zyansheep Then it's quite useles. There is low risk that anywone breaks in to my home and tamper with the hardware on my computer, on the other hand it's connected to internet so it could be compromized by software and remote hackers.
      And I want to be able to upgrade and repair my computer, tampering with hardware and UEFI settings myself.

    • @Daniel-yy3ty
      @Daniel-yy3ty 2 роки тому

      @@zyansheep there is something it can do, if the part that got compromised was part of the state you selected (no idea how that part works, maybe it's not doable)

    • @zyansheep
      @zyansheep 2 роки тому +10

      @@lubricustheslippery5028 yeah, i agree. Having a secure (open source) OS which won't be as vulnerable to exploits is much better for most people. TPMs seem pretty useless to the average consumer imo.

    • @LordNementon
      @LordNementon 2 роки тому +1

      Of what encrypted keys are you talking about? Your Bitlocker key? It's not saved inside the TPM, but ciphered with the TPM. You will have a backup of it as every Bitlocker users know.
      If your drive is compromised when it is up and running, you drive will be already unencrypted, Bitlocker protect against unauthorized access of lost or stolen drive.
      Anyway W11 home users will probably do not have access to Bitlocker, it has so far only be available for Windows Pro users and Microsoft do not have said so far that it will changes
      TPM is not only use for Bitlocker. Secure boot it is not an issue, it can always been disabled on BIOS/UEFI in worth of all scenario
      Others Windows security features that leverage the TPM, use virtualization to avoid any others software to access it's secrets (you can looks for Windows Virtualization based security), which protect "runtime" internal Windows secrets that do not survive a reboot, btw

  • @ya64
    @ya64 2 роки тому

    This is the best explanation of TPM I've seen so far. One thing I still don't understand though is, how does it make it more secure in a practical sense, from a user's perspective?

  • @donaldboughton8686
    @donaldboughton8686 2 роки тому +1

    Concept of TPM has been lurking around for a number of years. I seem to remember some years back of claims of TPM posing a threat to Linux or other alternative operating systems.

  • @chrisspencer6502
    @chrisspencer6502 2 роки тому +17

    Welcome to a whole new world of driver errors

  • @CH-vb5kr
    @CH-vb5kr 2 роки тому +9

    To me it looks like I'll remain with Win 10 - but gradually move over to Linux as I get more and more software for it.
    Who asked for or wants TPM?
    Not 99% of Windows users I bet.

    • @enochliu8316
      @enochliu8316 2 роки тому +1

      And most of these users already have it anyway. If you have purchased a laptop with Window 10 installed, you have this TPM chip, and you use it all the time.

    • @LordNementon
      @LordNementon 2 роки тому

      Linux users asked, want them and use them 😜
      I hope for you that you will use it under Linux

    • @pigpenpete
      @pigpenpete 2 роки тому

      windows 11 works fine on a pc with no tpm, if you're willing to jump through a small hoop

  • @Garr3tth
    @Garr3tth 2 роки тому

    So, it basically operates kinda like a sim card or the secure enclave for the iphone, storing secure keys and only giving out wrapped versions (optionally unwrapping the key for authenticated users). Thank you for this clear description. 🙂

  • @NiekNooijens
    @NiekNooijens 2 роки тому +2

    I wrote a bootloader that loads encrypted binaries, but only if:
    Secure boot is enabled (disabling flips a PCR)
    My bootloader is loaded (again PCR)
    and my bootloader is signed with my private key (one of the PCR's changes when the secure boot key that's used changes)
    Only then will the TPM unseal it's decryption keys which are used to decrypt the binaries, which then load into memory. Before I jump to the OS I extend the PCR'S once more to re-seal the key, and then I boot the system.
    So here we are! Boot level DRM... DRM in de deepest layer of your system.

  • @SergioEduP
    @SergioEduP 2 роки тому +14

    Can't wait until a windows update changes some little detail that affects the system state used by the TPM and breaks all of the encrypted things you had.

    • @jesseweigert6664
      @jesseweigert6664 2 роки тому +2

      Windows update automatically refreshes the TPM state after updates to prevent that from happening

    • @reinei1
      @reinei1 2 роки тому

      @@jesseweigert6664 but how does windows update know where some of the sealed keys are? If I write my own program which uses the Windows API to have it ask the TPM to seal a key for me and then write that key into the hard Disk, how would windows update know that it needs to refresh that key on the disk as well since windows doesn't check all file I/O to mark any files that look like keys for later refresh?

    • @jesseweigert6664
      @jesseweigert6664 2 роки тому

      @@reinei1 I don't know the specific details on how it works, but I do know that the security model in WIndows prevents you from mucking with the TPM directly without invoking UAC.

  • @leastexpected3115
    @leastexpected3115 2 роки тому +13

    I still don't want tpm in my machine in regard how it would be implemented by companies that make this chips, what could be inside of them and what proprietary software would run on them

    • @tanmaypanadi1414
      @tanmaypanadi1414 2 роки тому +6

      I sense a fello Unix user

    • @leastexpected3115
      @leastexpected3115 2 роки тому +1

      @@tanmaypanadi1414 you right

    • @LordNementon
      @LordNementon 2 роки тому

      As, I've already said around here, Linux without secure boot is a terribly bad idea ...
      Don't make me believe all part of your computer use open sources firmwares ...

  • @To-mos
    @To-mos 2 роки тому

    My workstation uses a server motherboard so I've had one of these installed for about a decade now...never used it like I should have thanks for this video!

  • @medicalwei
    @medicalwei 2 роки тому +1

    Would you mind discussing dTPM and fTPM and their possible attack surfaces like attaching logic analyzer or changing firmware etc. ?

  • @ahmxtb
    @ahmxtb 2 роки тому +3

    I am so friggin glad the commenters are calling out the misleading statements in this video with the shortcomings of TPM systems. I hope the channel editors can learn a thing or two.

  • @hernancoronel
    @hernancoronel 2 роки тому +10

    TPM keys will be attacked as fast as the blue ray or other systems were attacked. It will be shared between so many companies and people that there is no way to guarantee the needed level of security to avoid determined attackers.

    • @BattousaiHBr
      @BattousaiHBr Рік тому

      even if that happens, that doesn't reduce your security at all since the wrapped keys are still being stored in your system.
      they'd need root access to your system at the end of the day, which is the same as having no TPM.

    •  Рік тому

      By this point (2021-07-23 when this video was posted) attacks against TPM had already been done, see Wikipedia. Well, WP lists the ones that we know of, we have no idea what NSA, GCHQ, et al are capable of.

    • @watfordjc
      @watfordjc 10 місяців тому

      Your TPM's key is only inside your TPM.
      An AACS key is inside every copy of that revision of that BD-player.
      DVD keys were weak because exporting hardware/software from the US with stronger encryption was equivalent to exporting bombs (PGP was classified as a munition).
      Unless you're sharing your computer with millions of people, a key wrapped/sealed by a TPM is about as hard/worthwhile to attack remotely as a key generated from /dev/hwrng and stored in /root/SuperSecretKey, or the encryption keys in your SIM card, or the keys used to digitally sign your passport.

  • @Slarti
    @Slarti 2 роки тому +2

    So basically it's the re-emergence of the 1990's dongle.
    IT technology seems to be a series of cycles claiming to be new but really just a slight change of something that was once around a few years ago.

  • @nattsurfaren
    @nattsurfaren 2 роки тому +2

    8:10 Does this mean that if windows fails to boot and I can't repair it, that I can't restore the data from another install. Does the TPM require the exact install that I had before the crash?

  • @pjninja9546
    @pjninja9546 2 роки тому +3

    When the key is unwrapped by the TPM, don't you then need to store that unwrapped key in the memory for the duration of the decryption cycle so that the CPU can use that key to decrypt the data? And doesn't this create the same problem again of having the key in memory?

    • @NeXuSInfoS3c
      @NeXuSInfoS3c 11 місяців тому

      Same thing I was thinking. please let know if you found any further info regarding this.

  • @NickNorton
    @NickNorton 2 роки тому +22

    Microsoft have been trying to push TPM for decades. It's been revised an poked around with. Microsoft as usual, so keen to make it inconvenient to run anything other than Nauseating Windows and Microsoft applications.

  • @Sk1pperCS
    @Sk1pperCS 3 місяці тому

    Very informative, this guy provided a great explanation.
    Thanks for uploading.

  • @goodoldmate5548
    @goodoldmate5548 2 роки тому

    This video was really needed, thanks

  • @CaptainWumbo
    @CaptainWumbo 2 роки тому +3

    Gosh I miss when computers weren't used for extremely sensitive data like your banking and every interaction with the government. There was a time when it didnt really matter that much if your computer had viruses because you didnt use it for anything important and you could just wipe everything and start fresh. Putting our credit cards on our computers was really painting an x on our backs, and now you can't really function without it. Same kind of vulnerabilities we're getting pushed into with every device having camera and microphone built it, just adding more layers of bright red paint to the X and screwing up our choice architectures with our do anything wonder devices.

  • @markclark787
    @markclark787 2 роки тому +14

    It sounds like you can not upgrade things.

  • @42svb58
    @42svb58 2 роки тому

    Love the videos! I would love to see videos on micro services, API, and distributed computing for the rapid rise of cloud computing!

  • @CaptainKirk01
    @CaptainKirk01 2 роки тому

    Thank you for this, I am well aware of the TPM, you helped me understand it better.

  • @janb.9425
    @janb.9425 2 роки тому +13

    Does a TPM even solve the problem?
    What is if the OS doesn't work as intended or has an exploit that makes it not use the TPM? Remember the TPM is used if you don't trust that the OS can keep the key secure, but you can only access the TPM through the OS.
    So instead of trusting the OS to keep the key secure you trust the OS to use the TPM without logging the key before the encryption and that the TPM doesn't leak the storage root key or the to encrypt key.
    That just creates an extra point of failure.
    Also what happens to your keys or encrypted drives if your TPM dies?
    You can't access your keys and encrypted data.
    You then should use a backup key?
    But doesn't make that the whole process obsolete?
    Please correct me if i am wrong.

    • @mheermance
      @mheermance 2 роки тому +6

      You're not wrong. The key has to be in the clear at some point to be useful, and that makes it vulnerable. This is an attempt to minimize the size of that window, but at the cost of increased complexity and thus decreased reliability. I suppose the counterargument is that secure boot makes a root kit impossible, but I imagine we'll eventually find out that doesn't work either. Remember the speculative execution data leak? The more complicated you make a system the more likely it has a critical failure that you're not smart enough to see.

  • @Mark1024MAK
    @Mark1024MAK 2 роки тому +7

    So by the sounds of it, a TPM is just a microcontroller running a specialised program?

    • @SebBrosig
      @SebBrosig 2 роки тому

      the design/manufacturing of it is handled in a more "secure" way, similar to other "secure" chips like access passes or bank card chips.
      So it's less likely that someone snoops out any security holes, or back doors which they are able to hide because of all the secrecy...

    • @JoQeZzZ
      @JoQeZzZ 2 роки тому

      Yeah, pretty much, you could most likely make your own because of the open spec. The thing is that there is physically no way to reprogram them, even if you have acces to the chip (you might be able to open up the IC and program through the die or whatever, but thats another point. It means that even if someone has acces to your hardware you still need to have extra acces to the tpm

    • @JoQeZzZ
      @JoQeZzZ 2 роки тому +1

      @@SebBrosig this is simply not true. Secrecy/obfuscation does not result in better security. The TPM spec is an open spec, which means that anyone can find out how they work. This is in fact why they are trusted: there is no secrecy involved.
      It could be just a micro, it is an ASIC of course, but the hardwade isn't some weird obscure hidden thing.
      Same with bankcards by the way. Most bankcard specs are pretty well known

    • @paulstelian97
      @paulstelian97 2 роки тому

      @@JoQeZzZ There is also something called fTPM, "Firmware TPM", where the firmware uses security features in the CPU (such as the AMD PSP or something in Intel that I forget) to implement the TPM. The root key is in the CPU itself.

    • @trejohnson7677
      @trejohnson7677 2 роки тому

      Lol

  • @XFourty7
    @XFourty7 2 роки тому

    How long will it take for someone to figure out how to trick the PCR in the TPM into thinking it's in the correct state?
    Also, are they just plug and play? Eg; With a TPM on board / in its header & enabled in BIOS, does it just "magically" work for all your passwords, just the system password, or do you have to change OS & software settings to use the TPM?

  • @Garth2011
    @Garth2011 2 роки тому

    I reckon there is a concern after viewing this information. If a computer uses backup/image software to create an image of C drive and saves that image to a second blank hard drive for storage and then the motherboard, cpu, memory and hard drives are removed and replaced with new hardware, will the image restore to the new hardware function normally?

  • @phrozenwun
    @phrozenwun 2 роки тому +9

    I want an external TPM like device that works like a real key and lock - a machine only works when I physically plug the device in or NFC and the crypto-key never leaves the key device though it can be duplicated by an authorized third party key service (hardware store key cutting kiosk analog) and the same key can be used on multiple target devices (phone, laptop, desktop etc.) The design of this key device must not allow monopoly capture.

    • @dadougler
      @dadougler 2 роки тому +3

      Look up Yubikey

    • @nullvoid3545
      @nullvoid3545 2 роки тому +4

      look up USB keys. and the FIDO protocol.
      its exactly what your looking for and everyone should have one.
      that way lazy peeps can finally stop using the same password for everything!

    • @insu_na
      @insu_na 2 роки тому

      Also sounds a lot like what systemd-homed is trying to achieve

    • @kiseitai2
      @kiseitai2 2 роки тому

      Yubikey, Librem key, there might be others

    • @mgord9518
      @mgord9518 2 роки тому +1

      This already exists on Linux

  • @LittleRainGames
    @LittleRainGames 2 роки тому +3

    I was just researching this, I plan to build my own TPM boards, just a single IC and some passives.

    • @namehidden8854
      @namehidden8854 2 роки тому

      Not advisable.

    • @thomasp4902
      @thomasp4902 2 роки тому +1

      It's not worth the effort. The margins are tiny. The main problem is that your IC will not have shielded memory for physical security like the sort made by microchip.

    • @thomasp4902
      @thomasp4902 2 роки тому

      Also note that you can use the firmware TPM on most processors :)

  • @Autotrope
    @Autotrope 2 роки тому

    If you go back to the early example of the software or OS kernel being compromised from the start, isn't this still an avenue by which an attacker can get the key? It seems from the description that the TPM protects against other systems or other OSes accessing it, not the same system which is compromised?

  • @otm646
    @otm646 2 роки тому +1

    When you say it is making sure Windows is in the same configuration what do you mean by that? Is that the same hard drive, the same ram, the same processor is when it was last signed?

    • @DFX2KX
      @DFX2KX 2 роки тому

      yep. hardware upgrades are allowed, but if a WHOOOLE bunch of stuff changes at once. it makes Windows go 'wait a minute'.

  • @MrGeekGamer
    @MrGeekGamer 2 роки тому +8

    Windows 11 sounds like a nightmare and what might push me to Linux full time.

    • @Roxor128
      @Roxor128 2 роки тому

      It was the prospect of Windows _10_ that pushed me to full-time Linux. A hardware failure with less than a year of support for Windows 7 remaining moved up my migration schedule a bit.

  • @soylentgreenb
    @soylentgreenb 2 роки тому +21

    And what if you can't trust the TPM, the software that is made for it or the actor who generates the root key for the TPM? Clipper chip anyone?

    • @AdamReece87
      @AdamReece87 2 роки тому +2

      You could say that about literally anything though. Do you trust all the software on your device you used to write that comment? Did any of it leak the keys used for TLS sessions? You probably don't know for sure.

    • @AdamReece87
      @AdamReece87 2 роки тому

      @Matt You don't have to trust anything, your welcome to your choices.
      The point I'm making is almost everything we use has cases for and against being trustworthy, and given none of us build 100% of everything we use ourselves we're always going to be putting trust in someone else.

    • @AdamReece87
      @AdamReece87 2 роки тому +2

      @Matt My point has been that TPM is no worse than anything else. Not intending to be "sneaky" and "dishonest", but I'm sure you'll read between the lines in whatever way you like. :)

    • @JosephDavies
      @JosephDavies 2 роки тому

      It's scary to see how many people have forgotten that the TPM came out of the same era and had a lot of the same supporters.

    • @GT-tj1qg
      @GT-tj1qg 2 роки тому

      @Matt No. What he's saying is, if you don't trust the TPM to be not compromised, then you don't trust the manufacturer. If so, why are you using their equipment at all?

  • @itstheweirdguy
    @itstheweirdguy 2 роки тому

    What is the difference between having a discrete TPM chip, or having a CPU based TPM like Intel PTT, or AMD fTPM? Does that basically live inside the platform security module in the CPU, for example the Intel Management engine or AMD PSP? Seems to me it's still in a chip, so is there a real difference?

  • @crides0
    @crides0 2 роки тому

    So what's the threat model expected here? It seems like the video assumes that the hacker has access to the user's hardware system, so what would prevent the hacker from hardware snooping the bus to the TPM and simply emulate the same configuration register information?

  • @SepiaSapien
    @SepiaSapien 2 роки тому +26

    Fun fact: In Brazil TPM is how we call a woman's PMS so its a little funny to watch this video thinking about this

  • @forb291
    @forb291 2 роки тому +15

    Wait, so the interface to the TPM is the OS (which I can't trust)?

    • @JohnnyWednesday
      @JohnnyWednesday 2 роки тому +2

      just shut up and install the NSA's backdoored chip!!

    • @VincentGroenewold
      @VincentGroenewold 2 роки тому +1

      It is yes, but you can't use the OS to change the TPM software (as far as I know).

    • @forb291
      @forb291 2 роки тому +1

      @@VincentGroenewold Doesn't matter. The OS could lie to me about everything and not even communicate with the TPM

    • @foobargorch
      @foobargorch 2 роки тому

      You have to trust the OS regardless, what a TPM helps with is verifying/enforcing that subsequent boots are running the same OS as when the values were set, even if the computer was booted to some other OS or was potentially tampered with in the interim.
      For example Heads is a corelinux based bootloader that checks a PGP signature on the files in the boot partition, and and lets you know if those are still valid. Every time you update verification will fail and you need to re-sign things (the key lives on a security token, e.g. yubikey). If this happens unexpectedly then your computer might be compromised, because something on the boot partition changed.
      But that raises the question, how do you trust heads itself hasn't been compromised? For that it uses the TPM to do a measured boot and and seals a TOTP/HOTP secret with it at setup time, that you can put in a phone app. On every boot it tries unseals the secret, and then displays a 6 digit code that you can compare. If the code matches, then you are almost certainly running the same bootloader, and therefore can at least trust that, but if it changed then you know that the computer is compromised and therefore you probably shouldn't enter your disk encryption password.
      FWIW that bit is based on Matthew Garret's anti evil maid stuff, I think that was the first thing to implement TPM + TOTP? not sure...

    • @Kikikan
      @Kikikan 2 роки тому

      @@forb291 If the OS does not communicate with the TPM, it won't be able to decrypt (unseal) the encryption key, meaning, your stuff will remain encrypted.

  • @randy7894
    @randy7894 2 роки тому

    Nice. A new Steve Talk.

  • @rchandraonline
    @rchandraonline 2 роки тому +2

    I have to wonder if there are going to be a whole lot of people adding a virtualization layer (such as Xen, VirtualBox, or VMware) to their perfectly good but lacking TPM systems, and trying to "fake out" Windows 11 with a software-only, virtual TPM.

  • @d34d10ck
    @d34d10ck 2 роки тому +5

    Anyone still remember the TCPA and how evil it was?

    • @namehidden8854
      @namehidden8854 2 роки тому

      What does it have to do with TPM?

    • @d34d10ck
      @d34d10ck 2 роки тому

      @@namehidden8854 Well, they are the ones that invented it.

    • @namehidden8854
      @namehidden8854 2 роки тому

      @@d34d10ck . . . then I guess I don't remember them :)

    • @LordNementon
      @LordNementon 2 роки тому

      "The Telephone Consumer Protection Act (TCPA) regulates telemarketing calls, auto-dialed calls, prerecorded calls, text messages, and unsolicited faxes. It also is the authority to create the National Do-Not-Call List."
      Never ear about them, what's the issue with them exactly?

    • @d34d10ck
      @d34d10ck 2 роки тому +2

      @@LordNementon The TCPA was also the Trusted Computing Platform Alliance, which developed the initial TPM specification.
      The problem with this association was, that they couldn't come to any agreements, because they had over 200 members with individual veto rights, so they dissolved the TCPA in 2003 and founded the Trusted Computing Group (TCG) as a successor, which then continued the work of the TCPA.
      You wouldn't believe what people were saying back then, what an implementation of those chips (back then often called Fritz-Chips) would mean for the consumers. It would mean the end of free speech, we wouldn't be in control of our own software anymore, operating systems like Linux would stop to exist and stuff like that.
      Microsoft ominous sounding project names around this, like Palladium, didn't help putting users at ease as well. Something like that in their OS made them pretty paranoid.

  • @michalveselenyi3801
    @michalveselenyi3801 2 роки тому +15

    Hmmm, so theoretically, when TPM dies (by accident 1 week after the warranty ends) , and my hdd or bootup is secured using ... 🤔

    • @stoneskull
      @stoneskull 2 роки тому +1

      at the end of the line you still gotta have a password.

    • @michaelrenper796
      @michaelrenper796 2 роки тому

      @@stoneskull No

    • @fllthdcrb
      @fllthdcrb 2 роки тому +5

      @@stoneskull But if you involve a TPM (or other key-bearing hardware device for that matter), the password is only part of the key material. Maybe that password is used to decrypt the key that is in turn used to decrypt your data. But however it works, if the TPM dies, you can no longer access your data, unless you have it backed up somewhere, either in the clear or encrypted with a key not protected by the TPM. So yeah, a TPM might secure the OS, but as far as I can determine, when it comes to your important data, it's either at the mercy of a piece of hardware that might fail, or not really protected by that hardware.

  • @tiemanowo
    @tiemanowo 2 роки тому

    So what is a difference between a dedicated TPM module / chip on the motherboard and those AMD / Intel implementations?

  • @laurinneff4304
    @laurinneff4304 2 роки тому +1

    You could also keep the OS unencrypted, encrypt only the user data, encrypt the key with your user password, and then only decrypt everything once you log in. It's what every smartphone does, and Linux does this as well if you use systemd-homed
    Another option is to show a separate password prompt on startup, but I personally don't like that because you need to enter two passwords

  • @OpenKeith
    @OpenKeith 2 роки тому +6

    ok but why would I want to use a proprietary chip with severe vulnerabilities and a backdoored RNG algorithm when I could literally just use a password or a USB dongle with my encryption key on it

    • @OpenKeith
      @OpenKeith 2 роки тому +4

      If TPMs are to become a thing, they MUST have open-source firmware and give complete control to the user. Under NO circumstances should it be possible for software to use the TPM to hide or restrict things from the user. Otherwise it can, and will, be used maliciously to *weaken* security.

  • @0ne87
    @0ne87 2 роки тому +8

    I feel like it's highly likely that TPMs will turn out to be the modern NSA CLIPPER chips.

    • @JosephDavies
      @JosephDavies 2 роки тому +3

      Very likely indeed. It only took twenty years, but the writers of the CBDTPA will finally get their wish, and they didn't even have to make it law. Microsoft just had to make it a requirement for an OS upgrade.

    • @jasonosmond6896
      @jasonosmond6896 2 роки тому

      There's already a number of components in your computer that could be sending the NSA your data right now, no TPM required.

    • @0ne87
      @0ne87 2 роки тому +1

      @@jasonosmond6896 of course, but a weakened encryption, if sent messages were to be encrypted by the tpm, would allow for mass surveillance of encrypted communications by the NSA. This was the original intent of the clipper chip after all.

    • @jasonosmond6896
      @jasonosmond6896 2 роки тому

      @@0ne87 That's already the case, right now. The Clipper Chip was only a thing because at the time encryption was computationally difficult, there weren't yet any encryption standards, so it made sense for the The Man(tm) to try and get a backdoor on the ground floor, especially with VOIP apps and devices. Now, encryption is cheap, and there's any number of paths that could exploited to weaken your encryption and you'd never know it. Right now, you have to trust Microsoft, AMD, Intel, motherboard vendors, device vendors, and software vendors with the security of your data. With TPM, you have to trust Microsoft, AMD, Intel, motherboard vendors, device vendors, and software vendors with the security of your data. The difference is with TPM, MS can enforce limits on which vendor has access to data on your machine that you haven't given them permission to and ensure that your system hasn't been exploited at the firmware level.

    • @0ne87
      @0ne87 2 роки тому +1

      @@jasonosmond6896 the clipper chip came out when the feds were trying to classify PGP ask munitions. The chip was then developed as a "compromise" for those who wanted strong encryption. In reality, the chip itselfs was thoroughly back doored.
      If I was the paranoid type, I'd think you were the feds by the way you described the clipper chip.🤣🤣
      Also, all the components you listed are still running user controlled software. The inputs and outputs can be studied to verify that the proper computations took place. With an IC, it's a black box.

  • @katnax3059
    @katnax3059 2 роки тому

    So, I have a work PC, and I just encrypted the partitions i use with bitlocker. If i install another windows on different partition, newer OS will rest of partitions as encrypted drives?
    Also, If I have AMD fTPM running on both computers, and on one of them, Motherboard fails, can I swap the CPUs and all my encrypted drives and everything will work smoothly?

  • @mybluemars
    @mybluemars 2 роки тому +1

    The manufacture will always have the key, but where do they store it?

  • @Razumen
    @Razumen 2 роки тому +13

    The way they work now TPMs don't protect the end user, they benefit manufacturers and OS makers far more and can easily be abused by then with nothing the user can do about it.

    • @BattousaiHBr
      @BattousaiHBr Рік тому

      how exactly can they do that?

    • @Razumen
      @Razumen Рік тому

      @@BattousaiHBr Because they control the keys, which determine what is and isn't allowed to happen. You literally have to get a key from Microsoft if you want to install Linux on a computer with secureboot enabled.

    • @BattousaiHBr
      @BattousaiHBr Рік тому

      @@Razumen how do the manufacturers control the keys, which are stored in your computer?

    • @Razumen
      @Razumen Рік тому

      @@BattousaiHBr Because it only stores them, it doesn't sign them.

    • @BattousaiHBr
      @BattousaiHBr Рік тому

      @@Razumen you didn't answer the question.
      how do manufacturers control the key that is stored in _your_ computer?
      i'm assuming you didn't watch the video and just immediately commented here...

  • @TheRealInscrutable
    @TheRealInscrutable 2 роки тому +10

    It sounds like that once you use TPM you cannot upgrade your hardware any more???
    It also sounds like we have to trust a thing that we cannot control.

    • @DFX2KX
      @DFX2KX 2 роки тому +1

      you can upgrade hardware with the TPM. Windows and linux update their configurations when you do. but you can only upgrade so much at once (I think the CPU and motherboard require re-installation of either OS).
      And that's the thing, TPMs enhance security by walling themselves off from the OS. This means that malicious code can't mess with them, but it also means you and I can't mess with them either.

  • @olinanderson2451
    @olinanderson2451 2 роки тому +1

    Will Microsoft or the TPM's builder have a copy if all the TPMs root keys and who has them?

  • @6LordMortus9
    @6LordMortus9 2 роки тому +2

    What happens when you replace your motherboard (for any reason)? Now you have a new TPM with a new key that you weren't using with all your other things.

  • @JosephDavies
    @JosephDavies 2 роки тому +22

    Unfortunately, this sounds an awful lot like a system designed to allow Microsoft (and potentially others) to encrypt or decrypt things on _my_ computer and prevent me from accessing it. That's the key question: who is getting the trust and security? As long as it is possible for there to be keys _I_ cannot access, _I_ cannot trust a system with a TPM. A TPM makes the system inherently untrustworthy and insecure to me, the owner. Yes, this is fundamentally already an issue when it comes to trusting your OS and the software you run, but the TPM takes this threat (and the illusion of trust and security) to a new level.

    • @MagicPlants
      @MagicPlants 2 роки тому

      bro you're not DARKSIDE okay lol this didn't require attention until all the ransomware

    • @jasonosmond6896
      @jasonosmond6896 2 роки тому

      Microsoft can already do those things without TPM, as well as your CPU vendor, and your motherboard vendor, and any software on your machine that has administrative rights. A TPM makes it so that the things that *you* want to keep encrypted remain encrypted to programs, hardware, and users that might get access to them.

    • @electronix6898
      @electronix6898 2 роки тому

      Even more of a reason to keep maining Linux at this point unless Linux does something similar under the hood that I'm not aware of

    • @LordNementon
      @LordNementon 2 роки тому

      @@electronix6898 Obviously that Linux support secure boot, it's a minimal operational security to have ...

  • @robmorgan1214
    @robmorgan1214 2 роки тому +3

    Looks like supply chain attacks are getting a major upgrade that can't be updated or easily patched... looking at you sme, spectre, meltdown, etc. TPM = lol.

  • @aec007
    @aec007 2 роки тому

    Are there any PCI cards (or USB dongles) out there for TPM 2.0 for motherboards that do not have the plug in location?
    I do not seem to be able to find any....

  • @custard131
    @custard131 2 роки тому

    this sounds like it could potentially be useful protection against data being accessed on stolen machines (protecting contents of a harddrive/ssd), assuming the security of the TPM is good. but i dont see how it makes any difference with malware?
    if i was able to get in a position where i had access to the contents of ram on a victims machine, whats stopping me from from asking the tpm to decrypt something for me?
    as soon as i wrote this i did remember a few situations where read only access to memory was exposed so maybe it would help there? but still feels like it doesnt offer much protection for a compromised system

    • @LordNementon
      @LordNementon 2 роки тому

      Study how secure boot works, you will have a first answer for Windows AND linux system
      Regarding Windows and it's specific usages, you can looks on Microsoft virtualization-based security (VBS)
      Then, after having reviewed your operational security, do active secure boot, and if under W10, take the time to enabled what will be the minima for W11 security 😉