• 1 Post
  • 13 Comments
Joined 1 year ago
cake
Cake day: June 11th, 2023

help-circle


  • I recently dug into this because I accidentally trashed my wife’s OS which was encrypted with bitlocker. PITA btw and I couldn’t beat the encryption

    Bitlocker encryption key hash is stored in 2 possible places. First is an unencrypted segment of the encrypted drive. This is bad because it’s pretty easy to read that hash and then decrypt the drive. The second place is on a Trusted Platform Module (TPM) which is a chip on the motherboard. This is better because it’s much more difficult to hack. It can be done but requires soldering on extra hardware to sniff the hash while the machine boots up. Might even be destructive… I’m not sure.

    Either way a motivated attacker can decrypt the drive if they have physical access. For my personal machines, I wouldn’t care about this level of scrutiny at all.

    Anyways you can see if any open source solutions support TPM.





  • Lodra@programming.devOPtoLinux@lemmy.mlHelp me choose a distro, please!
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    1 year ago

    Hardware has come up a few times in this post now. Seems I should share a bit about what I’m running 🙂

    I bought an ASUS ROG Strix GA15DK just over 2 years ago. The hardware was shiny but not top-tier at the time. It’s not new at this point but also not old by Linux standards.

    • AMD Ryzen 7 5800X Processor
    • NVIDIA GeForce RTX 3070
    • 16GB DDR4 3200 MHz RAM