Hacker News new | past | comments | ask | show | jobs | submit | taco9999's comments login

Then how would you know if the original random numbers were affected?


Once the hash function is inevitably broken in a few years you can find out.


> kitchen knives were made impossible to use for homicide

Can't wait for kitchen knives that immediately self-destruct if you use them on items that didn't come from the knife manufacturer's grocery store.



wow thanks

what is 3b1b "hidden" channel -- is this official too


Probably not, since there will be a warning screen displayed on boot if the bootloader is unlocked.


And wouldn't I see that warning?


See: https://xkcd.com/488/

Also, since a lot of different movie streaming services (e.g. Hulu, Disney+) have launched, a lot of content has moved off of Netflix, leading to a higher piracy rate.


The emulated TPM will not contain the TPM manufacturer's private key that is used to sign responses.


Which is why the comment which started this sub-thread mentioned buying extra physical TPM 2.0 chips. They contain the correct keys, and since they're external devices, it's trivial to lie to them, pretending to be the physical CPU doing a normal boot.

Of course, that only works until they start rejecting external TPM chips, and accepting only the built-in "firmware" TPMs found in more recent CPUs.


Yeah, Pluton "fixes" this because it's inside the CPU.


nit: the TPM contains its own internally-generated private key. That private key never leaves the TPM, and has nothing intrinsic to the manufacturer.

The manufacturer then signs the public portion of that TPM key, creating the ability for everyone to assert that said key was generated internal to their hardware (and thus couldn't be used by an emulator).

You yourself could also sign the public portion of the TPM key, or even generate a new one and sign it, but that wouldn't affect the perverse incentive generated by the manufacturer's assertion. It would just enable you to assert that you trust the TPM key is internal to the TPM without trusting the manufacturer's records.

We're dealing with something like the dual of software signing here.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: