Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
deno
on Jan 17, 2025
|
parent
|
context
|
favorite
| on:
Bypassing disk encryption on systems with automati...
You’ve answered it yourself. Without TPM you have no idea if you can provide the secret to the system or if it’s compromised. Whether that secret comes from TPM or network is secondary.
Consider applying for YC's Summer 2026 batch! Applications are open till May 4
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: