this post was submitted on 10 Oct 2025
97 points (100.0% liked)

Linux

10014 readers
461 users here now

A community for everything relating to the GNU/Linux operating system (except the memes!)

Also, check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Truscape@lemmy.blahaj.zone 46 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

The TPM 2.0 implementation (mandated by Microsoft) is flawed. That much is certain.

If you'd like to know more details about the "benefits" and vulnerabilities of the standard, feel free to read the relevant wikipedia article: https://en.wikipedia.org/wiki/Trusted_Platform_Module

In my personal opinion, the TPM as a whole seems like a "solution in search of a problem", and developments that were able to foil its protection as early as 2010 from state and non-state actors should be a massive red flag.

[–] possiblylinux127@lemmy.zip 4 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

Physical security is very hard

TPM is a useful to help ensure physical security. TPM isn't perfect but it is decent for what it is.

[–] eleitl@lemmy.zip 4 points 3 weeks ago

That assumes you can trust the unauditable. I can only accept open hardware, with verification of random samples.