vector_zero
IMO it’s not even about something making sense, we’re just very accustomed to fahrenheit, so it feels more natural to us.
I’ll be the first to admit that I have no idea about what’s warm and cold in Celsius. I know 0 is quite cold, 20 is room temperature, and 100 is near instant death.
Once that key is loaded in memory anyone with 10 minutes and access to google could trivially unlock your computer in several different ways. It is virtually exactly like having no security whatsoever.
I highly doubt it.
If you have any tips for how I can personally bypass my computer’s encryption in 10 minutes without being able to login, I’d love to try my hand at it.
The idea behind it is that the files are stored encrypted at rest, which is really what you want, because once a system is booted, you have to play by the computer’s rules (respect file permissions, policies, etc.).
The TPM provides a secure mechanism to provide a decryption key to the computer during boot, eliminating the need for direct interaction.
Could it be compromised? Probably, but it would take considerably more effort than a man-in-the-middle on your keyboard via a logic analyzer.
I second this.
Full disk encryption is entirely practical for everyday use. If you don’t already have a dedicated TPM, your motherboard/CPU may provide a software TPM (fTPM?). If so, you don’t even have to interact with the machine during boot. It’s just a bit slower to start up (by a few seconds), which really isn’t a big issue for your average user.