Bypassing disk encryption on systems with automatic TPM2unlock (oddlama.org)
from exu@feditown.com to cybersecurity@sh.itjust.works on 17 Jan 10:51
https://feditown.com/post/981497

Note this post evaluates Linux systems. Microsoft presumably has a different, hopefully better, implementation.

#cybersecurity

threaded - newest

QuizzaciousOtter@lemm.ee on 17 Jan 14:02 next collapse

Great post, thanks! A lot of complex knowledge broken down into simple pieces. I’m going to try to incorporate the NixOS solution into my config today.

LodeMike@lemmy.today on 17 Jan 19:53 collapse

The article-given TLDR is probably one of the worst I’ve seen so,

TLDR: The TPM exposes the password once the kernel boots, and you can coax it into this state by swapping out the encrypted partition with one you know the password to, in the unencrypted config file, in order to get it to that state.