Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

OP is trying to say that this TPM TOTP approach doesn’t help verify a machine is legitimate if there is a possibility that the machine you’re using has been swapped with a malicious one.

This doesn't really mesh well with what the TPM-TOTP idea is trying to solve: trust in the machine you’re using.

Hyperbolic or fairly extreme-sounding scenarios are common when discussing this kind of thing, partly because it makes discussion about a fairly boring topic a little bit more interesting. Don’t get distracted by that.

That being said, using a TPM-based TOTP is pretty extreme sounding in and of itself.



> Hyperbolic or fairly extreme-sounding scenarios are common when discussing this kind of thing, partly because it makes discussion about a fairly boring topic a little bit more interesting. Don’t get distracted by that.

It's not. They are very much intended to derail serious discussions around threat models.

> That being said, using a TPM-based TOTP is pretty extreme sounding in and of itself.

It's not. It's trivial to implement.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: