Learn about the different types of VPNs and when to use them. Find out which type of VPN suits your needs with this comprehensive guide.
Learn about the different types of VPNs and when to use them. Find out which type of VPN suits your needs with this comprehensive guide.
This is a 2-part series where we’ll explore vulnerabilities in systems that use Trusted Platform Modules (TPMs) for disk encryption, exposing the risks of unverified initramfs images and bus sniffing attacks.
In this article, we’ll look at how disk encryption uses the initramfs and you’ll see why using PCR 9 is so important for properly securing a system.
In my previous post, I explained how TPM disk encryption works and how simply including PCR 9 fixes a relatively major security hole in many setups. This time I’m looking at a hardware attack, bus sniffing. This attack also works against Windows BitLocker, although the solution can’t be implemented on Windows unless you happen to work at Microsoft.