| ▲ | Liskni_si a day ago | |||||||||||||||||||||||||
TPMs can be useful to you as an individual if you're trying to protect against an evil maid attack. Although I think Linux isn't quite there yet with its support for it. The systemd folks are making progress though. | ||||||||||||||||||||||||||
| ▲ | SAI_Peregrinus 21 hours ago | parent | next [-] | |||||||||||||||||||||||||
That only helps if you set a strong password as your TPM PIN. Otherwise its hardware-bound with no access control, and just as susceptible to evil maid attacks as storing the keys directly in a file. | ||||||||||||||||||||||||||
| ▲ | ajross 20 hours ago | parent | prev [-] | |||||||||||||||||||||||||
> evil maid attack So does a pass phrase though, with significant less complexity and fragility. Again, the linked article and responses here are making IMHO a pretty bad mistake with threat model analysis. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||