Clear and straight to the point. I like how you talked about the TPM and gave useful information rather than some random definition found online.
@AdamskiHamski9 ай бұрын
Great explanation, thank you.
@abidj.guerrero19924 ай бұрын
Useful, thanks!
@andretorresbr10 ай бұрын
Very nice video. Thank you.
@zvonkocosic593923 күн бұрын
Wait, how do you mean PIN cannot be used from another device to login? I know that PIN and EK are used to create a specific key for authentification, but I can stil login with the PIN on some other device through my RMM system. And that is worrying me because what if the hacker can use the same or similar way to login? If he knows the pin for example. How common this problem can be? Can someone explain this to me please?
@evilskunk113 күн бұрын
I hate to burst your bubble but Windows Hello is not really that safe. Anyone with a screwdriver, a hard drive dock and some patience can get into it. Windows Hello kinda works for remote applications but it can loose your pin and you would be locked out of your own computer. To keep that from happening you need to make a recovery dongle with a USB thumb drive. If you didn't make that recovery tool then you might as well reinstall Windows because it will never login again otherwise. hello is kind of lame if you ask me
@es-br8ck7 күн бұрын
Common misconceptions you bring up there. They aren't unwarranted, but there are controls that mitigate it. Opening the case: Business laptops have the option to clear the TPM whenever the case is opened or the BIOS battery goes flat, by the same mechanism. Unless you know exactly where the TPM is located on the mainboard for this specific device AND carefully drill a hole in it - without getting any metal flake inside that could short a circuit and destroy the thing - you COULD extract the keys the TPM is sending to the CPU. This attack has been demonstrated publicly, so it is difficult, but not impossible, especially with common hardware or rich attackers. That's why on modern CPUs, there's another option: a firmware TPM, embedded in the CPU itself. No one is going to a) open the case without triggering the case open switch AND b) remove the CPU itself (which often is soldered to the mainboard nowadays) AND c) keeping the BIOS battery voltage applied to the correct pins on the CPU while doing so, because otherwise (because it'll clear the embedded TPM as soon as that voltage drops) AND d) remove the lid and the silicon material from the flip-chip mounted die itself to get to that 1x1mm area on it where the firmware TPM is located and read that out with an electron microscope. Attackers will not spend such an amount of money on that as it is very expensive even for large and proper intelligence agencies with no guarantees of it even working. If the TPM clear is triggered by something, Windows will reset the PIN and face unlock data and you need to log in with the password and / or the MFA method of your choice. Therefore, the PIN (and the Bitlocker key, stored in the same manner) are probably safer than the password + MFA method of recovering it and therefore, add convenience, but don't subtract security - unless the user chooses birthday or 000000 as their pin.
@auntieact25 ай бұрын
Pins or password at the bank?… pin or password shopping?
@auntieact25 ай бұрын
How long should pin be. Can you use pin with credit cards when shopping?
@auntieact25 ай бұрын
Need simple answer are pins … can I use pin to get cash ?