Reply to post: Re: Did I read TPM root keys?

Ignore the noise about a scary hidden backdoor in Intel processors: It's a fascinating debug port

doublelayer Silver badge

Re: Did I read TPM root keys?

Not exactly. You can access the processor part, but only while it is running. If you have physical access but no access to the system running on the device (E.G. encrypted disk), you could not see it in action because you couldn't run that system. You could of course boot up your own image, but then the data you want to extract wouldn't be resident in the processor. In order to use this maliciously, you need to have access to the system while the processor is working on data you want to steal.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon