Timeline for Protecting file system contents with TPM and Encrypted File System
Current License: CC BY-SA 3.0
        7 events
    
    | when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| May 9, 2013 at 16:58 | comment | added | jordanm | What is preventing the user from pooling the drive out, changing the root password to access root and the keyfile? If they have physical access, they can always find a way. | |
| May 9, 2013 at 16:06 | answer | added | jcharaoui | timeline score: 0 | |
| Apr 15, 2013 at 9:08 | history | tweeted | twitter.com/#!/StackUnix/status/323724496752242688 | ||
| Apr 14, 2013 at 14:03 | comment | added | Chris Collingwood | Yes, the TPM is installed in the unit and enabled in the BIOS. I have been able to communicate with it using the TPM-utils (tpm_takeownership, tpm_version, and so on). We were originally attempting to do a whole encrypted drive (only /boot not encrypted), but have now settled for a single encrypted partition for our application to reside in. | |
| Apr 3, 2013 at 23:10 | comment | added | Gilles 'SO- stop being evil' | Do you actually have a TPM in that computer? Is it enabled in the BIOS? | |
| Apr 3, 2013 at 13:14 | review | First posts | |||
| Apr 3, 2013 at 13:25 | |||||
| Apr 3, 2013 at 12:57 | history | asked | Chris Collingwood | CC BY-SA 3.0 |