• Wild_Mastic@lemmy.world
    link
    fedilink
    English
    arrow-up
    34
    arrow-down
    4
    ·
    edit-2
    5 days ago

    I still cannot understand the utiliy of tpm, except for tricking tech illiterate people to spend money on a new pc.

    • notabot@lemm.ee
      link
      fedilink
      English
      arrow-up
      20
      arrow-down
      2
      ·
      5 days ago

      It’s a way of tying an encryption key to the processor. Depending on how you look at it that’s either a good way to ensure your disks aren’t readable if they’re separated from your machine or a vendor lock-in.

      • madcaesar@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        ·
        4 days ago

        Man, I recently ran into this shit when I bought a computer for my patents. I wanted to upgrade their hard drive and the fucking thing wouldn’t boot unless I fully cloned the original hard drive into the new one.

        I never even knew about this fuckery

        • notabot@lemm.ee
          link
          fedilink
          English
          arrow-up
          4
          ·
          4 days ago

          It certainly can be a pain in the proverbials. It’s one of those things that can be good or bad. When it’s the end user deliberately choosing to use it, it can provide extra peace of mind and lock down certain attack vectors, when it’s the vendor doing it, it’s just a way to make it harder to service your machine. That it also still locks down certain attack vectors is almost a byproduct in that scenario.