Talk:Trusted Platform Module
This is the talk page for discussing improvements to the Trusted Platform Module article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: 1Auto-archiving period: 12 months ![]() |
![]() | This article has not yet been rated on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
|
|
|
This page has archives. Sections older than 365 days may be automatically archived by Lowercase sigmabot III when more than 1 section is present. |
Reorganize the availability section
I'd like to reorganize the availability section, which is titled TPM is implemented by several vendors: into sections on the TPM itself, platforms, software support, virtualization.
Is that OK? — Preceding unsigned comment added by Kgold1 (talk • contribs) 17:55, 2021 June 17 (UTC)
Restriction law section
The restriction law section states that Chinese and Russian laws restrict TPM access and then link to an article that speculates the reason that Windows 11 has optional flags to remove the TPM requirement is due to these laws.
However, the following press release shows that China and Russia both approved of TPM 2.0 -- https://trustedcomputinggroup.org/trusted-computing-group-tpm-2-0-library-specification-approved-isoiec-international-standard-date-published-june-29-2015/
I can also confirm that desktops that have been purchased in China have TPMs in them. — Preceding unsigned comment added by 59.148.176.172 (talk) 08:04, 2021 July 21 (UTC)
Needs reference for edit on Chinese algorithms.
A recent edit says (in the past). This needs a citation. — Preceding unsigned comment added by Kgold1 (talk • contribs) 21:11, 2021 August 13 (UTC)
Please update Richard Stallman's reaction to TPM
The final thought in the reception section is no longer accurate. I had to check citation 63 because I was surprised to read that. Indeed, he did state that TPM is harmless in 2015. But then an update in 2022 states, "As of 2022, the TPM2, a new 'Trusted Platform Module', really does support remote attestation and DRM. The threat I warned about in 2002 has become terrifyingly real." 135.245.48.87 (talk) 11:15, 3 May 2023 (UTC)
"Versatile" or "Volatile" Memory ?
In the image at the top labeled "Components of a Trusted Platform Module", shouldn't "Versatile Memory" be "Volatile Memory", the latter being contradistinct from "Persistent Memory" just above. BMJ-pdx (talk) 15:19, 7 July 2023 (UTC)
Attacks
I've read somewhere that Win11 with disk encryption with TPM can be decrypted using a oscilloscope (if you can get between the chip and the CPU). 89.67.244.199 (talk) 19:49, 20 December 2023 (UTC)
- Link to source? –Novem Linguae (talk) 22:08, 20 December 2023 (UTC)
Here's something Microsoft's Bitlocker & TPM encryption combo defeated with a $10 Raspberry Pi and a bit of braininess | PC Gamer[1]
Wolf1098 (talk) 04:22, 12 February 2024 (UTC)
- ^ Laird, Jeremy (9 February 2024). "Microsoft's Bitlocker & TPM encryption combo defeated with a $10 Raspberry Pi and a bit of braininess". Retrieved 11 February 2024.
{{cite web}}
: CS1 maint: url-status (link)
- All unassessed articles
- C-Class Cryptography articles
- Mid-importance Cryptography articles
- C-Class Computer science articles
- Mid-importance Computer science articles
- WikiProject Computer science articles
- WikiProject Cryptography articles
- C-Class Computer security articles
- High-importance Computer security articles
- C-Class Computer security articles of High-importance
- C-Class Computing articles
- High-importance Computing articles
- All Computing articles
- All Computer security articles
- Mid-importance Computing articles
- C-Class Computer hardware articles
- High-importance Computer hardware articles
- C-Class Computer hardware articles of High-importance