On Sun, Nov 30, 2014 at 5:19 PM, Mick <michaelkintz...@gmail.com> wrote:
> On Sunday 30 Nov 2014 19:05:52 thegeezer wrote:
>> *if* you trust it is not backdoored
>
> Well, yes, in the post Snowden era I do not trust it.  At all.
>

Keep in mind that you have to consider your threat model.  I think it
is fairly likely that the NSA has backdoors into most TPM chips (I'm
not sure I'd even limit that to US-made chips).  On the other hand, I
also consider it likely that the NSA has zero-days for every browser
around, and likely privilege escalation attacks against linux, and
maybe even attacks against most of the hypervisors out there.  If the
NSA REALLY wanted your data, then they're going to get it.  Of course,
some attacks are a larger concern than others.  Actually accessing a
TPM back-door, or utilizing a zero-day, likely requires actively
modifying your internet traffic, which carries a risk of detection.
They won't hesitate to do that if they are on the trail of some
terrorist, but they probably won't do that as part of some kind of
widespread surveillance net since there would be a pretty high
likelihood of detection if they did that to everybody, and then they
lose their zero-day.  On the other hand, if TPM-seeded random numbers
aren't really random then they might be able to passively decode your
SSL traffic which is something that would be almost impossible to
detect, and that could be done as part of an effort to read
everybody's TCP streams.

Honestly, I don't really worry about the NSA.  If they want to read my
traffic they're going to do it, and the only way to stop them would be
to wrap so much tinfoil around my head that I basically couldn't
interact with anybody online.  I'm more concerned with things like
identity theft, cryptolocker, physical theft of laptops, and so on.  A
TPM provides a significant level of protection against some of these
attacks.  LUKS does as well, but at a cost of convenience and a risk
of downtime if you're running it on a server and it ends up rebooting
when you aren't around.  Why would you care about full-disk encryption
on a server?  Well, ever have a hard disk die on you?  Can you
guarantee that when a hard drive dies that you'll always have the
ability to wipe it before returning it for a warranty swap?  With full
disk crypto you're safe even if you can't wipe it.

--
Rich

Reply via email to