How so? If I rip the disk from the system, there's no TPM to begin with. And analogous to the situation in the article, I would be attacking the "passphrase" the TPM would hand out. So it's back to Attacker vs. PBKDF2. What am I missing here?
Power management, mobile and firmware developer on Linux. Security developer at nvidia. Ex-biologist. Content here should not be interpreted as the opinion of my employer. Also on Mastodon and Bluesky.
Re: systemd-cryptenroll
Date: 2023-04-18 07:29 am (UTC)