Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Ask Lemmy
  3. People who use Linux, do you Enable Secure Boot and use the TPM (for Full Disk Encryption)? Or do you have those off?

People who use Linux, do you Enable Secure Boot and use the TPM (for Full Disk Encryption)? Or do you have those off?

Scheduled Pinned Locked Moved Ask Lemmy
asklemmy
21 Posts 19 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • T This user is from outside of this forum
    T This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #1

    Reason I'm asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

    N O T N B 16 Replies Last reply
    16
    • T [email protected]

      Reason I'm asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

      N This user is from outside of this forum
      N This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #2

      The TPM a backdoor, I guess it may be technically possible but it is highly unlikely. If you need a backdoor, the UEFI of a computer is a much more feasible option, especially with built in AMT firmware for remote management.

      1 Reply Last reply
      2
      • T [email protected]

        Reason I'm asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

        O This user is from outside of this forum
        O This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #3

        The concept of secure boot and the TPM and BitLocker and all that stuff is somewhere between protection against hackers with hands on access to your system, protection against rootkits infecting the boot sector, protecting the average amateur end user from themselves doing something dumb, and keeping you in the Micro$haft ecosystem.

        If you're fairly comfortable that none of these should be a significant risk to you, then I'd say disable it and do whatever you want with your own system without all the headaches.

        1 Reply Last reply
        13
        • T [email protected]

          Reason I'm asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

          T This user is from outside of this forum
          T This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #4

          None. I just install os and use it without any encryption and such. It's more important for me to be able to access data on device failure than encrypt it.

          1 Reply Last reply
          12
          • T [email protected]

            Reason I'm asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

            N This user is from outside of this forum
            N This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #5

            On my own machines I don't use Secure Boot and FDE, on work machine I do.

            1 Reply Last reply
            1
            • T [email protected]

              Reason I'm asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

              B This user is from outside of this forum
              B This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #6

              Off, and integrated TPM's have been pwnd multiple ways for a while now

              1 Reply Last reply
              3
              • T [email protected]

                Reason I'm asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

                orkneykomodo@lemmy.sdf.orgO This user is from outside of this forum
                orkneykomodo@lemmy.sdf.orgO This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #7

                TPM + secure boot on my laptop. TPM only on my desktop.

                1 Reply Last reply
                1
                • T [email protected]

                  Reason I'm asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

                  S This user is from outside of this forum
                  S This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #8

                  My machines are old enough to not have that, so no. But, there are a lot of tpm implementations and I don't think they are backdoored in general. I know of some industry projects to use them in data centers. Otoh they often have vulnerabilities.

                  If I wanted a hardware token I'd use a dedicated one but that's just me.

                  1 Reply Last reply
                  1
                  • T [email protected]

                    Reason I'm asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

                    P This user is from outside of this forum
                    P This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #9

                    I use both. They work well and get out of my way, while adding security. Just make sure you use a distro that has those things working OOTB and you'll be fine.

                    1 Reply Last reply
                    1
                    • T [email protected]

                      Reason I'm asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

                      M This user is from outside of this forum
                      M This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #10

                      "TPM is a backdoor" was something that got bandied around during the Vista era psrtially by people not understanding and partially (imo) to muddy the waters.

                      Secure Boot was maligned as at the time only MS were allowed to sign for it, so it was just an anti-linux locker. Later, after much haranguing, they backpedaled and allowed Canonical and Redhat to sign things, much much later, we could self sign.

                      TPM was also maligned around the same since MS (allegedly) had aspersions to only allow signed software which would be encrypted so that 'bad actors' (the users themselves) couldn't change 'protected' (any) executables. I think the closest we've ever seen of that is Windows S.

                      bjoern_tantau@swg-empire.deB 1 Reply Last reply
                      12
                      • T [email protected]

                        Reason I'm asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

                        L This user is from outside of this forum
                        L This user is from outside of this forum
                        [email protected]
                        wrote on last edited by [email protected]
                        #11

                        TPM isn't a backdoor but it's veey hackable for Linux. Unless the issue somehow got fixed.

                        I use full disk encryption with a password only for my root partition. Everything else is automatic.

                        1 Reply Last reply
                        2
                        • M [email protected]

                          "TPM is a backdoor" was something that got bandied around during the Vista era psrtially by people not understanding and partially (imo) to muddy the waters.

                          Secure Boot was maligned as at the time only MS were allowed to sign for it, so it was just an anti-linux locker. Later, after much haranguing, they backpedaled and allowed Canonical and Redhat to sign things, much much later, we could self sign.

                          TPM was also maligned around the same since MS (allegedly) had aspersions to only allow signed software which would be encrypted so that 'bad actors' (the users themselves) couldn't change 'protected' (any) executables. I think the closest we've ever seen of that is Windows S.

                          bjoern_tantau@swg-empire.deB This user is from outside of this forum
                          bjoern_tantau@swg-empire.deB This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #12

                          To be fair, we see all these things (or similar) used in the mobile and console space used to do the shitty stuff we were afraid of.

                          zak@lemmy.worldZ 1 Reply Last reply
                          3
                          • T [email protected]

                            Reason I'm asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

                            O This user is from outside of this forum
                            O This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #13

                            I don't, because I have better control over my disks. With TPM, the keys are stored within the chip itself, and I won't be able to unlock it if I boot into another OS (re-installing, dual boot, etc). With password, while inconvenient, I know that I can always unlock it, ans the chance of locking myself out is negligible.

                            TPM being a backdoor doesn't seem likely to me. Worst case scenario, transparent mode is just as bad as unencrypted disk. Most of the time, it adds extra security, though you are at the risk of locking yourself out.

                            1 Reply Last reply
                            4
                            • T [email protected]

                              Reason I'm asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

                              B This user is from outside of this forum
                              B This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #14

                              Off. My system won't boot with it turned on. It just hangs at a black screen. From what I've been able to find out, it's due to unsigned video drivers.

                              1 Reply Last reply
                              2
                              • bjoern_tantau@swg-empire.deB [email protected]

                                To be fair, we see all these things (or similar) used in the mobile and console space used to do the shitty stuff we were afraid of.

                                zak@lemmy.worldZ This user is from outside of this forum
                                zak@lemmy.worldZ This user is from outside of this forum
                                [email protected]
                                wrote on last edited by [email protected]
                                #15

                                It's weird this didn't get more pushback on mobile. Even the mainstream press was critical when Microsoft proposed it for PCs.

                                bjoern_tantau@swg-empire.deB 1 Reply Last reply
                                3
                                • zak@lemmy.worldZ [email protected]

                                  It's weird this didn't get more pushback on mobile. Even the mainstream press was critical when Microsoft proposed it for PCs.

                                  bjoern_tantau@swg-empire.deB This user is from outside of this forum
                                  bjoern_tantau@swg-empire.deB This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by
                                  #16

                                  It was kind of the norm with phones. The shift from cellphone over feature phone to smartphone was gradual enough that outside of some enthusiasts nobody cared about running their own OS on one.

                                  Nowadays I even wish I could run my own OS on my washing machine.

                                  zak@lemmy.worldZ 1 Reply Last reply
                                  1
                                  • bjoern_tantau@swg-empire.deB [email protected]

                                    It was kind of the norm with phones. The shift from cellphone over feature phone to smartphone was gradual enough that outside of some enthusiasts nobody cared about running their own OS on one.

                                    Nowadays I even wish I could run my own OS on my washing machine.

                                    zak@lemmy.worldZ This user is from outside of this forum
                                    zak@lemmy.worldZ This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by
                                    #17

                                    It had been the norm for phones, then Android came along and a much more PC-like level of capability became the norm for phones. SafetyNet didn't show up until five years later and it didn't get significant negative press.

                                    1 Reply Last reply
                                    1
                                    • T [email protected]

                                      Reason I'm asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

                                      B This user is from outside of this forum
                                      B This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by
                                      #18

                                      I don't use either of those. If I were to use anything I'd use Linux's LUKS disk encryption, but as others have said, I'd rather error on the side of data recovery if I lose the keys.

                                      1 Reply Last reply
                                      3
                                      • T [email protected]

                                        Reason I'm asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

                                        thisbenzingring@lemmy.sdf.orgT This user is from outside of this forum
                                        thisbenzingring@lemmy.sdf.orgT This user is from outside of this forum
                                        [email protected]
                                        wrote on last edited by
                                        #19

                                        I just use LUKS and type a boot password like a fucking pioneer of computing!

                                        1 Reply Last reply
                                        2
                                        • T [email protected]

                                          Reason I'm asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

                                          M This user is from outside of this forum
                                          M This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by
                                          #20

                                          I use heads firmware, which seals an otp key in the tpm to let you verify the integrity of the firmware, which then uses your gpg pubkey written into the firmware to verify the integrity of the boot partition.
                                          An open, self-controlled equivalent to secure boot that relies on the tpm and your own gpg key, instead of on vendor secure boot signing keys. Very cool project!

                                          1 Reply Last reply
                                          5
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups