Security Expert Explains TPM 2.0 & Secure Boot | Ask A PC Expert

Поделиться
HTML-код
  • Опубликовано: 13 янв 2025

Комментарии • 762

  • @kristian80au
    @kristian80au 3 года назад +203

    Would like to see more of this person in the future, great conversation!

    • @FreedomForAll2013
      @FreedomForAll2013 3 года назад +8

      Yeah smart and polite and professional that guy

    • @ColinTimmins
      @ColinTimmins 3 года назад +4

      I agree, very nice guy and makes for a good "interviewee". Polite and entertaining. =]

    • @castcrus
      @castcrus 3 года назад +2

      Reminds me of my cyber security unit teacher back in the uni, almost the same age, same down to earth friendly vibe, and definitely a professional. makes me seriously consider if i should pursue a career in cyber security.

    • @melgibson6240
      @melgibson6240 3 года назад

      lol he's a total sock puppet.

    • @waynepage8570
      @waynepage8570 2 года назад

      guess after 4 years time to buy another pc guess an i 7 with max ram and ssd not pass Bs

  • @KubeSquared
    @KubeSquared 3 года назад +276

    Are there any TPM modules with RGB on them? This is a very important question!

    • @yumri4
      @yumri4 3 года назад +3

      why would you put RGB onto a PCB with 1 chip? It is that small for serval reasons but most of all to not take up space. IF you wanted to you could buy the TPM module and RGB lights like the ones that flex then use the RGB lighting to go over the TPM module as most if not all of them plug into the motherboard and have very little space between them and the thing the motherboard is on.

    • @vijaykumar-to5vd
      @vijaykumar-to5vd 3 года назад +40

      @@yumri4 every hardware has to be RGB even comodos why would any one want without RGB. RGB is must, even food has to be in RGB only

    • @photonboy999
      @photonboy999 3 года назад +18

      @@yumri4 ,
      UM... it was a joke (did you watch the end of the video?). Plus, obviously a TPM module is far too small to put an LED on, nor would there be sufficient space left in a typical ATX case to hold all the photons it would emit.

    • @MadsterV
      @MadsterV 3 года назад +8

      it would run faster

    • @dakoderii4221
      @dakoderii4221 3 года назад +14

      Linus: "and water cooled!"

  • @MasterKoala777
    @MasterKoala777 3 года назад +42

    I’m only 5 minutes into the video and already learned a lot. Awesome interview and guest!

  • @PimptatoPCs
    @PimptatoPCs 3 года назад +95

    TPM is responsible for countless people thinking they had a USB 3.0 header on their circa 2010 mobo.

  • @SinisterPuppy
    @SinisterPuppy 3 года назад +18

    Thing that gets me about this requirement. Even if your keys are secured in the TPM; for say Bitlocker; once you're in userland those keys become memory resident. Most exploits are software based; its not that hard to execute manage-bde -protectors C: -get or various powershell commands to get the recovery key.
    For me in the past 20yrs maybe only 5% of security breaches have been physical thief. Most are like hafnium; an exploit on an already running (unlocked) system. I 100% get this for HIPPA/PCI compliance, business clients, and mobile devices. For home desktop users though, hmmm.

    • @user-hk3ej4hk7m
      @user-hk3ej4hk7m 3 года назад +2

      You need administrative privileges to get the recovery key. With administrative privileges you can also just dump the decrypted drive. Bitlocker can only do so much, Microsoft should consider that most people don't have any idea of what "yes" on a uac prompt means.
      Only rootkits are impossible to defend against by the OS itself, that's why secure boot is also a requirement. Without rootkits Windows Defender will always be able to scan the system, if there's malware that's able to exploit some privilege escalation vulnerability, to try to get the bitlocker keys, defender will likely kill it before it runs.

    • @rapiddu6482
      @rapiddu6482 3 года назад +4

      Ever heard of Memory Integrity (HVCI)?
      Surprise surprise it is only available in processor 8th gen and up using specialised hardware embedded in the CPU.
      From here you're are intelligent enough about why the 8th gen and up requirement for win11. It not only turns all these security features ON by default but makes it mandatory requirement of the OS.
      PS: You can simulate software based memory integrity but it really affects system performance by upto 40% depending on memory size and CPU raw power. Definitely not recommended.

    • @SinisterPuppy
      @SinisterPuppy 3 года назад +1

      @@user-hk3ej4hk7m Look current print spooler exploit. There have been ways to bypass UAC in the past and get an elevated powershell prompt. Not saying more security is bad, just forcing it as a requirement on those of us who know how insecure Windows will always be is a sick joke.

    • @SinisterPuppy
      @SinisterPuppy 3 года назад

      @@rapiddu6482 Thanks both of you for replying. Gave me some things to read up on. techcommunity.microsoft.com/t5/windows-it-pro-blog/comprehensive-protection-for-your-credentials-with-credential/ba-p/765314 (hopefully YT doesn't delete this link)
      While I agree this is awesome tech; finally plugging the mimikatz hole; I don't see why they are going to make this a hard requirement. What if I don't want the hyperv roles enabled on my system? I've had issues in the past running other hypervisors (Virtualbox / Vmware workstation) while it's enabled.
      Hope it ends up being enforced on OEM systems, but optional for those of us who are confident in our computing habits.

    • @rawhide_kobayashi
      @rawhide_kobayashi 3 года назад +2

      @@SinisterPuppy and in the end none of it matters when your average luser downloads exe and lets it run as admin anyway

  • @Trifler500
    @Trifler500 3 года назад +9

    16:15 - Note that you do need to be logged in as an administrator for the TPM Console to work. It will say so if you're not.

  • @EagleEye-MJG
    @EagleEye-MJG 3 года назад +49

    Way too many Tech Channels are overlooking this level of USEFUL dialog & communication.👏👏 They're way too engrossed in the next expensive gadget to push.🙄

  • @thomaspedersen6442
    @thomaspedersen6442 2 года назад +11

    It looks like Microsoft didn't back down on their requirements for security features after all.

  • @SamsMediaCenter
    @SamsMediaCenter 3 года назад +1

    This was an excellent video. I didn't expect to enjoy this video as much as I did. 24 minutes just flew by. I never felt the need to move forward in the video manually, which I usually do on other RUclips videos. Excellent & conversation between the two individuals. Both interviewer and interviewee were great.

  • @jamest2861
    @jamest2861 3 года назад +7

    Secure boot is going to cause a lot of problems. Once you turn it on, now it might not recognize your your drives, your GPU or even your memory. And you won't even be able to boot into BIOS to turn it back off. In essence rendering your mother board into a paper weight. And the solution by Microsoft will be to replace your computer with one that has windows 11 already loaded! I suggest to anyone trying to make these adjustments in their BIOS to have a dual BIOS board such as gigabyte so when you destroy one BIOS you have another one left to try to run windows 11 or switch back to windows 10.

    • @briankane7440
      @briankane7440 3 года назад

      This is not true. You can enter BIOS and turn off secure boot again, or to update the allowed keys. The biggest issue would be if your video driver key is not signed or not permitted then you will not have video, but you can use serial potentially.

    • @Nnda8731
      @Nnda8731 3 года назад

      Bruh fake news much? Sounds like the hackers are hella pissed off their lives are getting 10x harder

    • @02091992able
      @02091992able 3 года назад

      If it doesn't recognize a OS and the drive its on. That is because its a OS running on what is called Legacy Bios. Windows 10 at least has a command prompt command that can convert a OS and drive from running on Legacy Bios to UEFI or GPT without harming the OS or drive. Disable secure boot and it should come back up.

  • @adgarza
    @adgarza 3 года назад +5

    If you go to the Advanced or Security options in the BIOS of your DIY computer, and you are using, let's say, 8th Gen Intel, chances are that you will be able to turn on the Intel PTT (Platform Trust Technology, equivalent to TPM) functionality. It depends much more on firmware/BIOS settings than in own processor's settings.

  • @johnstancliff7328
    @johnstancliff7328 3 года назад +10

    right now, TPM modules are extremely hard to buy. I have a MSI motherboard, and when I bought mine in 2011, I added the TPM module at that time. Now 10 years later, windows 11 come out and the module is outdated. I tried to check to see if the newer module was available, and it wasn't. when I enable the existing TPM, windows 10 doesn't see it. can't tell if the module is good or not. for a lot of computers, the TPM module is missing, its was offered as an option and was available until; now. MSI, Asus, and others are having issues with this requirement. a lot of people don't even know what this is all about...this is really causing issues with consumers.

    • @liaminwales
      @liaminwales 3 года назад +2

      There is no panic or rush to upgrade, win 10 will have support for a long time so you dont need to rush out to buy anything.
      As always wait for other people to test the OS find the bugs and let Microsoft patch them before you make any jump & by then it will be easy to buy a TPM thing.

    • @jonshadow4052
      @jonshadow4052 3 года назад +2

      @@liaminwales WIN10 ends in 2025

    • @Ronnysun0788
      @Ronnysun0788 3 года назад

      depending on if you MB BIOS support the TPM or not.

    • @Ronnysun0788
      @Ronnysun0788 3 года назад

      Your MB

    • @MFMArt
      @MFMArt 3 года назад

      @@jonshadow4052 not only is that a lot of time, but windows 10 wont stop functioning, it just wont be supported with regular updates.
      OPs motherboard is older than 10 years (15 by 2025) very much in the range to replace/upgrade. Also TPM modules arent hard to get, you can find them between 25-100 bucks. if upgrading a system is too much, a TPM module is not a big deal.

  • @rh4009
    @rh4009 3 года назад +9

    TPM is there to protect Microsoft, Warner Bros, at all, from YOU, making it harder for YOU to make backups of your content, games, etc. It also makes you a tenant on the computer you think you own.
    It is part and parcel of the Software as service plan. It allows the developer to control when the software you rent stops running.

  • @kwl189
    @kwl189 3 года назад +7

    With or without tpm or secure boot, I for one will not be updating to windows 11 no matter what. Nothing ever works properly when released by corporations these days. I’m fed up with paying top dollar for shit that doesn’t work as advertised and to a standard that I agreed to when making my purchasing decision.

  • @Silent1Majority
    @Silent1Majority 3 года назад +6

    "A+" to the both of you for such a fantastic breakdown of this topic. Much appreciated.

  • @JaquesBobè
    @JaquesBobè 3 года назад +22

    Gotta love how the expert carefully and clearly explains what those technologies are, just to pull the rug and say with 100% confidence that Microsoft is not gonna require them 😂

    • @arsonfly
      @arsonfly 2 года назад +1

      I'm from the future and Windows 11 requires them to install. There are ways around it but it's not very secure.

    • @PaperBagMan884
      @PaperBagMan884 2 года назад +2

      That didn’t age well lol

  • @DrorF
    @DrorF 3 года назад +4

    9:48 Windows v-word?! Oh, _Windows _*_Vista_* ... Took me a looong time to figure that one out. Almost forgot about that one for some reason.

  • @JusticeGamingChannel
    @JusticeGamingChannel 3 года назад +7

    Great Explanation, well-done PC World!

  • @itsdeonlol
    @itsdeonlol 3 года назад +8

    Great interview! This really explained everything because I was confused. This guy is awesome Adam!

  • @randomgeocacher
    @randomgeocacher 3 года назад +4

    TPM also supports authentication, remote attestation etc. so it is a very important building block for WebAuthn TPM variants, Microsoft Azure Attestation, etc. if you want to increase the level of services provided securely, with some percent of clients malware infected, you have to have a trusted computing base to only release keys and attests to correctly booted OS:es.

    • @waynepage8570
      @waynepage8570 2 года назад

      bs when you have a 4 year old hp pc i 7 ssd and wont pass bs

  • @yamilabugattas3895
    @yamilabugattas3895 3 года назад +27

    This was a really nice interview, you should have him on again!

  • @eukariootti1
    @eukariootti1 3 года назад +1

    In your BIOS/UEFI, there might be this kind of options to choose from:
    * Firmware TPM (with the help of your CPU)
    * Dedicated TPM (done by external Module on the motherboad)
    * Nothing.
    Firmware TPM:
    * AMD: *fTPM* (at least *Zen+* i.e. 2000-series Ryzen Desktop from 2018)
    * Intel: *PTT* (at least *8th Gen* i.e. Core ix-8xxx Desktop from 2017 & 2018)
    One way to check TPM's status: Run > *tpm.msc*

  • @DangerGnom
    @DangerGnom 3 года назад +6

    it should be an option, not mandatory. A very good interview, thanks for doing it. Helped me understanding it better.

    • @markdawson25
      @markdawson25 3 года назад

      Windows is an option... Linux Mint is a better one

    • @HTHAMMACK1
      @HTHAMMACK1 3 года назад

      @@markdawson25 Linux is still garbage, and will continue to be compared to Windows or Mac OS no matter how long you Linux fanboys peddle that crap.

  • @MatthewParksSr
    @MatthewParksSr 3 года назад +3

    Mike Dan!!! He is a great friend, an awesome person, and fabulous speaker and instructor.

  • @synthwave7
    @synthwave7 3 года назад +4

    Yes, no need for a hardware TPM module for Win11. Simply enable TPM in the BIOS [FTPM] - several videos on YT to show you how to do this.

  • @ramonlnegron6120
    @ramonlnegron6120 3 года назад +7

    Awesome video, wow, I feel much better about Windows 11 after watching it. Thanks!!!

  • @FrankLeeMadeere
    @FrankLeeMadeere 3 года назад +6

    I think this clearly points to Microsoft having plans to be a bit more iOS like with some sort of "MSpass" that once you're in the system you don't need any passwords (or just one master) for almost anything with the OS handling the "keychain" etc.. This will be marketed as "user friendly" and "more secure" but I highly suggest we wait for version 2 or 3!

    • @FrankLeeMadeere
      @FrankLeeMadeere 3 года назад +1

      13:00 Exactly my thoughts! They'll just say that "MSpass" (see above) is only available to those with TPM 2.0 and SecureBoot.

    • @mrtuk4282
      @mrtuk4282 3 года назад +3

      To be honest it is the lock in for Home users to have a MS account that is a big worry aswell as they seem to be trying to create a walled garden like Apple so you are forced to use the MS Store and be unable to install from anywhere else - Even so much as welcoming Steam and Epic to join the MS Store - LOL that would be the end of their business models if the do that, because MS could sell the same software/games and undercut them because the will already be forcing a levy on them !

    • @haraberu
      @haraberu 3 года назад

      That function (internally named CredWriteA and CreadReadA) was added in WIndows XP. You know that little window that pops up when you connect to a \\shared\folder ? Any Windows app can use it. The database is encrypted with your Windows login password. You are correct with the "wait for version 3" because at least originally there was only one database per user, shared across all apps.

  • @williammurdock3028
    @williammurdock3028 3 года назад +40

    how can TPM 2.0 protect us from microsoft

    • @mrtuk4282
      @mrtuk4282 3 года назад +6

      Hahhahaahahaha Brilliant comment - best ever !

    • @user-hk3ej4hk7m
      @user-hk3ej4hk7m 3 года назад +5

      Use Linux and sign your kernel with your own keys. OEMs are required to provide an option to use custom keys for secure boot. From Linux you can save LUKS keys on the tpm and set it up so that it decrypts the drive automatically.

    • @mrtuk4282
      @mrtuk4282 3 года назад +2

      @@user-hk3ej4hk7m What happens if you get a motherboard failure, can you just move the system to an identical system or is your drive locked to that dead motherboard ?

    • @user-hk3ej4hk7m
      @user-hk3ej4hk7m 3 года назад +1

      @@mrtuk4282 Of course you can do that, you only need to keep a backup of the encryption keys somewhere safe. Bitlocker as well gives you the option to store the keys in your microsoft account. It's just part data hygiene

    • @mrtuk4282
      @mrtuk4282 3 года назад

      @@user-hk3ej4hk7m well with Home users forced to have a MS account then that makes them all safe then ! But if the m/b fails will putting new m/b allow you to boot up into windows so you can access your ms acc ? Backing up encryption keys sounds interesting for hackers using malware !

  • @midibenni
    @midibenni 3 года назад

    MSI Z390, i run it with i9 9900K
    If it's for Windows 11 installation, no need to install external TPM 2.0 module for Z390.
    Just enable "Secury Device Support" in BIOS, and press [win]+[R] key and run "tpm.msc" to check the TPM version in Windows.

  • @kmcbayne22
    @kmcbayne22 3 года назад +3

    I know my Ryzen 7 1700X has fTPM but also heard that Win 11 would not support 1st gen Ryzen? 👀 I plan to upgrade my rig regardless but wanted to make sure I'm Win 11 ready so this was good information. Thanks

    • @kmcbayne22
      @kmcbayne22 3 года назад +1

      @@ssaini5028 I'm too vain for that... I got to have the new shyt 😁 just unwilling to pay inflated GPU prices 🤑 so I'll wait it out and upgrade later.

    • @mhamma6560
      @mhamma6560 3 года назад +1

      @@kmcbayne22 You gain nothing from win 11, it's for alder lake and zen 5, aka when big.little comes to town.

  • @brenth82
    @brenth82 3 года назад +1

    I thought I would post this as a separate question, assuming the day comes where secure boot is not some thing that is able to be turned off any longer, who is the organization that actually decides which operating systems are allowed to be used? Does each individual distribution of Linux, forsake, have to get certified with each manufacturer of computers, or is there a notion of installing their certificate into your system, and telling it to trust it, sort of like what has been done with TLS certificates inside of companies for a long time now?

  • @anands7371
    @anands7371 3 года назад +1

    This is such a great conversation. 25 mins just flew bye.

  • @MEGALITHdotORG
    @MEGALITHdotORG 3 года назад +1

    Great interview, very informative, great tone, delightful guest! Thumbs up!

  • @bryanjfe
    @bryanjfe 3 года назад +2

    You need to address GPT in relation to this i think. I had no idea that MBR is not supported for secureboot and therefore my system i've upgraded over the years needed some tweaking.

  • @BOOSTEDDUDE
    @BOOSTEDDUDE Месяц назад

    Nice overview of TPM functions. I've been exploring the TPM and KEK (Key Encryption Keys) that are part of the TPM. It's pretty cool stuff.

  • @chimingito
    @chimingito 3 года назад +2

    I've been having awful stuttering on my pc after I enabled fTPM, it goes away when I turn it off in the bios, I think the claim that it doesnt affect performance needs to be looked into, I'm on a 3900xt

    • @chimingito
      @chimingito 3 года назад

      @Chris I'm on the latest bios and amd chipset drivers.

  • @Fraaip
    @Fraaip 2 года назад +1

    Are there any security implications from one implementation of TPM to another?

  • @lowstryder1022
    @lowstryder1022 3 года назад +4

    Very much looking forward to watching this! Thanks for setting this up Adam!

  • @igordasunddas3377
    @igordasunddas3377 3 года назад +1

    The idea might be great, but the problem is: whom does Secure Boot trust? Does it work with Linux with custom kernels etc.?
    Also super secret data (in the TPM) makes a PC possibly traceable and one has no control over it, because it's protected (even from access of the owner of that PC).

  • @markusTegelane
    @markusTegelane Год назад

    So, after Windows 11 launch it's possible to bypass TPM requirement on fresh installs with LabConfig registry key, but they say you might not get updates at some point if you bypass those requirements

  • @ToucH9000
    @ToucH9000 3 года назад +3

    Microsoft : TPM 2.0 and Secure Boot will provide you the best security
    Print Exploit : *Bonjour*

  • @randym1954tx
    @randym1954tx 3 года назад +1

    I have 6 PC, three of them have MB less than a year old, TPM had to be setup at boot bios, then ran mbr2gpt to create secure boot.... once I figured it out set it up was straight forward. The other machines have MB from 2011 or earlier did not have TPM....

  • @absurdbird3556
    @absurdbird3556 2 года назад +1

    FW-TPM (called PPT) has been on intel Core CPUs since Haswell in 2013. Most intel chips less than 8 years old will have it.

  • @tindo
    @tindo 3 года назад +4

    Fantastic interview, Give me MOAR!!!!!

  • @robertlawson4295
    @robertlawson4295 3 года назад +2

    I was surprised that Mike never brought up Intel PTT which is a firmware TPM built in to Intel chips from the 4th generation and newer. My Win10 computer uses a Core-i5 8th generation chip which has the PTT feature. With the feature off (by default) the TPM.MSC command shows no TPM available but when I enabled the Intel PTT feature then the command showed that I had TPM 2.0 in use. Hope this helps.

  • @RKelleyCook
    @RKelleyCook 3 года назад

    Favorite part of the video: the high end Klein Tool Screwdriver on the peg board. Those of us that do stuff more than just installing a motherboard (putting in a plug, cabling ehternet, etc.) know why high-end tools such as US-made Klein are something we all own.

  • @MrCg006
    @MrCg006 3 года назад +5

    Should have mentioned for anyone that gets curious.. if secure boot is currently NOT enabled on your "working" PC's bios, enabling it will prevent your system from booting (will blue screen). Do not enable in bios unless you are performing a clean Windows install. This has to be enabled before you begin the OS install. Turning on fTPM on the other hand does not cause issues.

    • @Vysair
      @Vysair 3 года назад

      I turn on Windows 10 WHQL Support and Secure Boot. The PC won't boot at all and enter bios (it's UEFI). Windows 11 fucking sucks. I'm on R3 2200G + 1050 Ti.
      BTW, I recommend PopOS or DeepinOS if you like Mac theme. I'm so fucking moving to Linux.

    • @MrCg006
      @MrCg006 3 года назад

      @ISCARI0T Secureboot is enabled in the bios. Once your settings are in place, you will boot from a DVD/USB and install windows. If you "have TPM" but no secureboot in your current OS install, you will not be able to just "upgrade" from 10-11 (as it is now). Need to do a clean install from scratch.

    • @elecman748
      @elecman748 3 года назад

      @ISCARI0T yep, Microsoft really used his big brain this time

    • @elecman748
      @elecman748 3 года назад

      @ISCARI0T if they got just 13 installs, maybe, if not... We are fked.

  • @peterchristie1096
    @peterchristie1096 3 года назад +1

    I Have a very low end acer notebook. TPM is present and I was able to install the Windows 11 Dev version with no issues. As it is a very limited computer I reverted back to W10 in the meantime. I can't say that I like W11 very much.

  • @godspyro2
    @godspyro2 11 месяцев назад +2

    I love how he treats Vista as a swear word.

  • @FuelrIce
    @FuelrIce 3 года назад +2

    Love the interview, nice to hear from a security expert just what these technologies actually are; however, I will need to correct him on one point. Windows 10 *did* in fact ship with the mandatory update feature, at least on Windows 10 Home. You can "snooze" or delay the updates -- for awhile -- but you cannot turn them off entirely without third-party software, and eventually Windows will stop letting you snooze the update and just install it without user input or consent. I upgraded from Windows 7 during the free-digital-upgrade period, and this extremely annoying "feature" was very much present on the system. It was also present on my daughter's Windows 10 Home install, 3 years later from physical install media. It is still present on both, as it cannot be turned off on the Home edition. So.. yeah, on that *one* point alone, I'll have to disagree with our esteemed expert. For the rest: Thanks for the new info, I do try to learn something new every day!

    • @Binary_Deviant
      @Binary_Deviant 2 года назад

      You can turn off updates permanently or until you want it turned on. Turn off the service.

  • @jpgarcia7892
    @jpgarcia7892 3 года назад +2

    Very informative and enlightening! More content like these in the future.

  • @phrtao
    @phrtao 3 года назад +1

    Ultimately any system (like TPM) has to have software access so there will always be a way of spoofing or exploiting it found eventually. TPM or Secure boot do not stop people installing software and that is how Malware and Viruses do the damage.

  • @ajc-th5ei
    @ajc-th5ei 3 года назад +8

    Secure boot has been compromised in the past through key leaks etc. So it really is not that secure. And firmware rootkit exploits have gotten around secure boot. So it is NOT as secure as being presented.

    • @Alexx_80
      @Alexx_80 3 года назад +1

      There are other requirements like VBS and HVCI. That's why 6th and 7th series of Intel is not supported. For now.

    • @biquiba
      @biquiba 3 года назад

      Typical YT comment section knowledge flexing. It was never presented as unbeatable, but its importance had to be stressed for a chance of ppl actually caring about it.

    • @coolwin7710
      @coolwin7710 3 года назад +10

      As somebody that studies cybersecurity, Microsoft TPM feature is more of a power grab then a security function. Yes it will protect from various types of malware, but Microsoft will have more control over your pc and you could lock your self out. Average users don't have to worry as much about security. Databases and servers are more vulnerable to attacks. Users on the other hand should just keep things up to date and use common sense.

    • @ajc-th5ei
      @ajc-th5ei 3 года назад +4

      @@coolwin7710 - (Sorry, some of this was written for other readers, not you.) Agreed. If it wasn't for Microsoft baking in so much telemetry, trying to lock down the platform (including WHQL requirements for them to make money, not to fully guarantee that the driver is authentic or safe, while ignoring older drivers modified to work on newer OSes or beta drivers that do not have a signature, which you should know the origin of the driver, of course, if running it like that; which I run a self-modified WHQL Nvidia driver which does not pass the driver signature enforcement found in the OS, with my mods cutting out numerous elements like telemetry), etc.
      Then again, I strip out a lot from my custom Win 10 ent rom, which you have to dance that line between removing the bloat and making it insecure (please, if you are the type to make your own roms, know or read to understand what each component does; I started years ago using Windows tools, now DISM; learn DISM first to understand what and why of the components and how to remove them that way before moving to something like NTLite, which is a GUI front end).
      As for TPM, to date, I've only used it primarily when using bitlocker for encryption of my drive. Until I know how exactly Microsoft is using TPM, I have some concerns. Is it like the built in Yubikey? Are they using it to lock licenses to registered keys stored in the TPM? Are they creating an encryption key for system files to prevent modification unless present with a password from the user and the TPM while locally present on an elevated credential screen? Until I know why they want it, this really seems like an annoyance and a reason not to upgrade from Windows 10 until I get new systems that need it (like for the scheduler, etc.). (just spitballing different potential uses for the TPM; I do not know what the implementation here is for).
      But I hear you. How I handle my server is different from my client systems, though.

    • @ajc-th5ei
      @ajc-th5ei 3 года назад +1

      @@biquiba - So I am not allowed to tell people that the stated reason for using it is illusory at times? I cannot discuss historic events that cut across current narratives the Microsoft is benevolent and that this is "for your safety," which although there may be some safety involved, this comes off more as a power grab, from WHQL certification to all sorts of other things. And let me guess, you love sending all that telemetry back to Microsoft to tell them how you use your computer, too. And that is just so they can better serve you, not to make money. *rolls eyes*

  • @andrewmcallister7781
    @andrewmcallister7781 3 года назад +4

    I enjoyed the video, however, i feel it is missing two important things, the TPM wont show in tpm.msc if it isnt enabled in the BIOS (often it is disabled by default), and you missed the requirement for a minimum of an Intel 8th Gen CPU or newer (so any PC older than 3yrs old wont be able to run Win11). I agree Microsoft are just testing the water at the moment.

  • @alexilaiho1st
    @alexilaiho1st 2 года назад +1

    Funny how TPM not only stands for Trusted Platform Module, but it could also stand for Tamper Proof Module since he explained it's hard to tamper with :p

  • @PtolemyPetrie
    @PtolemyPetrie 4 месяца назад

    For anyone wanting to know, if you currently have TPM enabled on windows Intel hardware and it's blocking you from accessing bios, backup to external drive and burn a copy of DBAN to disk, pull the drive and plugg the drive into a system you can access the bios to change the boot order to boot dban and make sure that back up system drive is unplugged so you don't accidentally overwrite the wrong drive and you can use DBAN to overwrite Microsoft control of that drive and then you can install Linux from USB fob, and you are free from the clutches of Microsoft

  • @ajslim79
    @ajslim79 3 года назад +4

    11:45
    Since TPM & Secure Boot is already build in into the hardware (for years) - WHY would someone "throw out his $3000 Rig now"?
    Do not believe it would be more then 5 years old at his point. That statement of yours is just false and misleading.

    • @Raletia
      @Raletia 3 года назад

      Haven't got that far in the video yet, but in reply to your comment, my x470 board has 'fTPM' and I enabled it but windows refuses to see it. I bought it brand new along with a 2700x at release. (Which is also apparently a not supported processor >.> )

    • @mhamma6560
      @mhamma6560 3 года назад +3

      Yes, they did a very poor job of educating which hardware has it native. Every 9th gen intel desktop CPU and every zen+ and newer CPUs have them built in with no additional HW needed. It's a really poor video educating people on the topic. Even microsoft's mentions are horrible. They give a "supported" CPU list without saying once that the list is of CPUs that TPM 2.0 native to them.

    • @ajslim79
      @ajslim79 3 года назад

      @@mhamma6560 that would be really something to say in the video, yes.

    • @MikeJones-bl6lu
      @MikeJones-bl6lu 3 года назад +2

      @@mhamma6560 fTPM is off at default. Problem is that you would need dozens of videos to show how to turn it on depending on the platform and board manufacturer. Every bios is different from each other.

    • @paulstubbs7678
      @paulstubbs7678 3 года назад +1

      Just show me where they are throwing them - I'll get my hands into that path...

  • @chuzzbot
    @chuzzbot 3 года назад +2

    It's really easy to implement win11 capability unless your computer is ancient.
    It is highly unlikely that a new PC doesn't have 'some' capability to either add a chip or flick a switch in the bios.
    Turn on PPT in bios security settings and it's all good.

  • @rquance1
    @rquance1 2 месяца назад

    I have the latest windows 64 bit and have TPM and secure boot on my machine but they are not enabled since I run a legasy/UEFI boot system. Windows saw the TPM and Secure Boot were available but were not enabled and windows still allowed updating to the latest and greatest version. I guess they really do not make a fuss about it.

  • @Miskatonik
    @Miskatonik 3 года назад +4

    Great guy, very knowledgeable and clear...funny question on FPS btw 😁

  • @rebornlol
    @rebornlol 2 года назад

    Excellent video. Enjoyed the guest speaker!

  • @VideoByPatrick
    @VideoByPatrick 3 года назад

    What a second ! I just enabled TPM 2.0 but left OFF Secure Boot and W11 evaluation app deteremined I qualify for upgrade to W11 from W10. How can that be if I have Secure Boot OFF ?

  • @Garth2011
    @Garth2011 3 года назад

    One big consideration many might have is...if TPM is enabled and secure boot too, can you still image an OS on the boot drive/SSD and restore it later and can you move that same SSD from one motherboard to another when you might upgrade or replace a motherboard? Or, if you buy a larger SSD, can you still restore the previous OS from the previous SSD to the new larger SSD? I'm thinking no if there are security keys that might be looking for the same motherboard and/or SSD hardware id's.

  • @benl1612
    @benl1612 3 года назад

    thank fk for this video honestly, could not find any viable information whatsoever on any websites or forums about what tpm is what it does and what difference discrete and firmware ones do and the settings you should look for and stuff. super good video. thanks.

  • @liaminwales
    @liaminwales 3 года назад +5

    Cool interview.
    Id love to see an ABC of security for normal home users.
    Do I need a password on my home PC?
    Is there anything I need to change in settings?
    and all the basic stuff that people forget or dont know.

    • @dakoderii4221
      @dakoderii4221 3 года назад

      That's WAAAAAY too simple. Needs to be more complex for more exposure to more people. Remember, bad press is good press. Then they can raise the prices because of the complexity of the situation. Not saying they are doing that but I wouldn't put it past them to do it.

  • @jesuismika
    @jesuismika 3 года назад +1

    On the discussion some arguments I'm not sure about. You are saying they will back of because people won't upgrade, but since it's free upgrade, it doesn't change anything for MS ? They'll still support w10 until 2025 so doesn't change a thing for MS either. So I'm not sure about your arguments ..

  • @tofu_golem
    @tofu_golem 3 года назад +6

    Someone once told me that the purpose of TPM/secure boot was to allow Microsoft to lock out competing operating systems. Was I told wrong?

    • @stefanl5183
      @stefanl5183 3 года назад +6

      Nope! You were told right. Guess who controls "digital signatures" and decides what operating systems are "safe" to boot? Interesting that Windows in the most hacked operating system in existence yet it's "digitally signed" as "secure". Yeah right!

  • @Foxtrot1967
    @Foxtrot1967 3 года назад

    Will physical servers running windows OS's and/or VM Host's need to have a TPM module on the motherboard?

  • @SamuelHollandsh
    @SamuelHollandsh 3 года назад +3

    Hi, nice video. I'm new to CPU/gpu since about five years or so ago. Thankfully I had recently went amd on this desktop and was wondering since I met the requirements why win 11 wasn't booting( it would loop back to win 10). I believe I finally found the answer; please correct me if I'm wrong:Secure Boot must be enabled before an operating system is installed. If an operating system was installed while Secure Boot was disabled, it will not support Secure Boot and a new installation is required. Thank you sincerely

  • @topandrun126
    @topandrun126 3 года назад +2

    Thanks for making this video this was very helpful.

  • @danethorson
    @danethorson 3 года назад

    I am confused about one thing - latest Intel chipset - Z590 motherboard from Gigabyte, still has TPM connector. So 11th gen Intel CPUs do not have built-in TPM and i still need to buy a module from Gigabyte for enjoyment of scalpers? Because TPM modules have vanished from most of the regular stores. But you can happily find them on ebay for 100+$

  • @PE4Doers
    @PE4Doers 3 года назад

    A shout out to Mike - a fellow CISSP :) Sorry I missed this when it was live (my Day Job can be a pain sometimes), it was very informative and interesting. David Rivera, PE, CISSP, MBA

  • @AdaaDK
    @AdaaDK 3 года назад +3

    Very good info and explanation . thx pc world. :-)

  • @GreggRoberts
    @GreggRoberts 3 года назад +3

    With this secure boot I hope the venders that utilize bootable media conform to it. Also, what about dual boot systems and/or using vm?

  • @memadmax69
    @memadmax69 3 года назад +5

    Microsoft suddenly wanting TPM bodes badly: If you were paying attention to microsoft and what they are doing for the past few years, you would know that microsoft is going the closed system route like MacOS, and TPM is the key to secure transactions via microsoft store as it identifies each machine via encryption...
    Which is great and all if all you do is game all day, but ur gonna be paying a microsoft tax as well...
    In the end, the TPM requirement is a signal of the beginning of the end of windows being open, and free/opensource software...

    • @mhamma6560
      @mhamma6560 3 года назад

      negative, each machine already has a unique identifier independent of TPM. How do you think MS locks win installs to a specific set of hardware?

    • @memadmax69
      @memadmax69 3 года назад

      @Chris Not the OS itself... And ur wrong there too: MacOS and iOS are based on open source linux so......
      Anyways, in my OP, I was talking about being able to go to any website, download something, install it and go...
      Something that can't be done on stock iOS, and the direction that MS wants to go: app store controls everything that you install on your machine.
      They have mentioned this before....

    • @memadmax69
      @memadmax69 2 года назад

      @Aussie Doomer I have the new 24" m1 imac and its... ARM...
      Very limited on what I can run. Rosetta helps but only a little.
      Meh.

    • @PtolemyPetrie
      @PtolemyPetrie 4 месяца назад

      Microsoft does that through the HAL hardware abstraction layer.

  • @lb4660
    @lb4660 Год назад

    Does secure boot slow down the boot processes much? Wouldn't secure boot only load when you shut down your computer and rebooted? How does that help the everyday user? Most people don't turn there computer off often.

  • @stevecurrier2462
    @stevecurrier2462 3 года назад

    I cannot find this answer anywhere. Is it possible yo put a TPM 2.0 module onto an older MB? Or in place of the one on it?

  • @RizwanZia
    @RizwanZia 2 года назад

    Great video, complicated terminologies nicely explained! :)

  • @dennissmith1435
    @dennissmith1435 3 года назад

    Question: If you use a hardware TPM module, dTPM, are these, or can they be a security risk. Could someone produce module that would be a security risk as a way to compromise your system? How do you know if a module is legitimate or not?

  • @michaelhawthorne8696
    @michaelhawthorne8696 3 года назад

    One thing I had to do to enable Secure Boot and fTPM........
    I had to change the Boot partion from MBR to GPT.
    Before I did this, disabling CSM in BIOS, I had no bootable disk for the OS
    Once I made the change, disabling CSM in BIOS, revealed the OS on the Bootable disk and I was good to go....
    I passed the Win 11 check...

  • @Be4givN
    @Be4givN Год назад

    Can TPM prevent installing a Entire Machine Backup from iDrive to the same computer?

  • @Ax4400
    @Ax4400 2 года назад

    Ok lets say secure boot & TPM are good security mechanism. How do UFEI / Secure Boot/ & TPM affect new linux installs ?

  • @DuneRunnerEnterprises
    @DuneRunnerEnterprises 3 года назад +1

    Btw, without disabling "secure boot",some motherboard would not boot with a newer video cards....

    • @alikarbasian8576
      @alikarbasian8576 3 года назад

      Cause the mother board ask the firmware (UEFI) to load the os into the guarded memory then the UEFI ask the OS to introduce and loaded up the hardware Drivers like sound cards or graphic cards or ... If they had been digitally sign ( it's a code that Hardware creator vender should got certificates for it's functionality by OS manufacturer like Microsoft (it's called WHQL)) then windows load it into the memory and tell the UEFI that I know this guy and he has valid ID then UEFi ask the security code for the OS and the OS uses the secure boot protocol and its code to load the windows . And the cool thing is the fast boot is a functionality that let the OS uses the fastest way to load OS files and use the private memory/SSD/IO to load very fast . And if you don't have a valid Driver that not digitally signed the OS will said the UEFI that I Have a driver but actually I don't really guarantee it's identity but I will and can work with it . Then UEFI will reject the driver and the OS will not boot correctly or even it will suspend from booting up . And you may wonder why driver is so important ? Cause they have a root OS access for the specific hardware or software and many hackers uses the fake drivers to load up some nasty malware or ransomware viruses hidden into the codes . You can check your WHQL version and information in dxdiag command in windows search/run.

  • @titotatianajuarez3248
    @titotatianajuarez3248 15 дней назад

    I would have liked to see Secure Boot or the TPM module actually working. In other words, if it doesn't trust the system, what does it do? What shows up on the screen? It would be interesting to see it in action if it actually does what they tell people it does.

  • @CreativlyCraftyDebb
    @CreativlyCraftyDebb 3 года назад

    I have an Asus Prime B450M-A motherboard and both TPM and Secure Boot are available but both are disabled. Do I turn on TPM first or is there a proper order to turn them on? Appreciate your time to reply PCWorld ... thanks.

  • @ibdribbles7128
    @ibdribbles7128 3 года назад

    Cute module but what part does MBR2GPT come into play? My system would allow secure boot until I converted...your comments?

  • @resolvanlemmy
    @resolvanlemmy 3 года назад

    My PC is from 2011 and it doesn't support Secure Boot. There is no Secure Boot option in the UEFI.

  • @farzadjahanfard
    @farzadjahanfard 3 года назад +1

    Thanks to you guys I found out I have it.

  • @petenielsen6683
    @petenielsen6683 3 года назад

    I have turned on secure boot on my X-570 A Pro (MSI) board and the TPM capability, but without the actual chip that costs 20 percent of what it cost me for the mobo itself my system still doesn't meet the minimum requirements as they are now. Newegg only carries the TPM2.0 chips intended for servers and specific brands at the moment and the ones made by MSI are only sold in Japan and / or China. Someone even posted on a tech page somewhere that scalpers are already hitting this market for 3 times what they normally cost.

    • @mhamma6560
      @mhamma6560 3 года назад

      Then you don't have a 2k, 3k, or 5k ryzen CPU. All zen+ and later CPUs have TPM 2.0 baked in to them. Google on how to actually enable your CPU's TPM functionality.

  • @MrChannel19
    @MrChannel19 3 года назад

    Is the updater possibly affected by computers to ignore the TPM?
    I see the TPM 2.0 but there must be a feature that blocks the recognition of the TPM from actively moving forward to upgrade.
    Will I need Microsoft Team turned on or is there a hack that is malicious to prevent the upgrade?

  • @softwarephil1709
    @softwarephil1709 5 месяцев назад +2

    Three years later, TPM is still required for W11. People aren’t screaming; they’re just sticking with W10.

  • @primeeon8226
    @primeeon8226 3 года назад

    quick Q, if i have a revodrive (recognized mysteriously as a SCSI device - a PCI card - that loads pre-bios, it could be a reason the combo of these 2 features doesn't work ?! best bet i guess 'd be to sell it off and get an M2 ? (should be faster too - these days) in case those 2 are still required to install - unlikely as it may seem.

  • @rawmaterials3909
    @rawmaterials3909 3 года назад

    Secure boot is in order to prevent rootkit. What this "security" issue has anything to do with blocking linux from booting?

  • @johanjacobs9240
    @johanjacobs9240 3 года назад

    With TPM 2 and secure boot enabled in my PC's BIOS, my NVMe.M2 SDD (which is my boot drive) suddenly have much slower write speeds. 1200 MB/s down to 400 MB/s
    What can I do to restore the original write speed of my SSD?

  • @TSUNAMI17
    @TSUNAMI17 3 года назад +2

    This was SO helpful. Thank you!

  • @JayzBeerz
    @JayzBeerz 3 года назад

    so we have to turn TPM and secure boot on in the BIOS?

  • @jgordon2925
    @jgordon2925 3 года назад +13

    microsoft biggest e-waste creator of 21st century

  • @edwardmacnab354
    @edwardmacnab354 Год назад

    Now a RUclips channel featuring Mike Danseglio would be a Godsend indeed ! Oh the Microsoft secrets we could all be privvy to ! Great Video .

  • @charlesm8944
    @charlesm8944 3 года назад +1

    Very detailed and clearly explained. Thanks!

  • @Taras-Nabad
    @Taras-Nabad 3 года назад

    Great video and great guest you had.