Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> if i have access to the tpm and the system, i can MitM it.

This is if you unlock your machine after an attacker has had physical access to it. "Evil maid" attacks are well-known (that is what these are called, someone installing MitM hardware on your computer). Whether contemporary machines are actually resistant to it in practice I am not sure.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: