I guess the TPM is being introduced by different entities but there is no crossed references between them with a well defined ground. As example the error: "The command-code 0000000000 (0x00000000) is not defined". If the parser already have an indexed heuristics for commands why there are no papers treating the issue by the proper machine semantics?
So.. Effectively a TPM is a hardware method to take in a root key and encrypted keys and encrypt/decrypt data... So the only benefit is that this isn't done in the main ram/CPU right? Which doesn't quite make sense over why a root key is required since the TPM must have that internally right (as it's said that you cannot use another TPM use it to decrypt it). .. and you can't migrate keys from one place to another - so new keys are then required when moving from place to place (or the normal solution of encrypting your keys using 'better' technology anyway)... So why use TPM? You've already got the keys stored elsewhere?
I guess the TPM is being introduced by different entities but there is no crossed references between them with a well defined ground. As example the error: "The command-code 0000000000 (0x00000000) is not defined".
If the parser already have an indexed heuristics for commands why there are no papers treating the issue by the proper machine semantics?
However, a simple and easy way:
Bitlocker->TPM Admin (If your BIOS have the feature available).
Both are Microsoft native apps on Windows OS.
It’s a little rude to publicly call the TCG idiots. Try joining the committee and fix it from within.
If a product is idiotic it was produced at some point by an idiot. Sanctioning body or not.
So..
Effectively a TPM is a hardware method to take in a root key and encrypted keys and encrypt/decrypt data... So the only benefit is that this isn't done in the main ram/CPU right?
Which doesn't quite make sense over why a root key is required since the TPM must have that internally right (as it's said that you cannot use another TPM use it to decrypt it).
.. and you can't migrate keys from one place to another - so new keys are then required when moving from place to place (or the normal solution of encrypting your keys using 'better' technology anyway)... So why use TPM? You've already got the keys stored elsewhere?
The TPM is available to the firmware before the OS is loaded.