←back to thread

658 points transpute | 1 comments | | HN request time: 0.221s | source
Show context
dathinab ◴[] No.35844589[source]
I don't understand how such keys can leak?

Hasn't intel heard about locking keys in hardware, e.g. like with hardware security key modules similar but faster/flexibler then a TPM. Surly one of the main developers of TPM does understand that concept.... right? /s

replies(4): >>35844629 #>>35844632 #>>35844776 #>>35844793 #
pmontra ◴[] No.35844629[source]
People know keys, people eventually leak keys. It always happened.
replies(1): >>35845018 #
mynameisvlad ◴[] No.35845018[source]
The point is that you can't leak a key from a HSM.
replies(1): >>35846627 #
1. josefx ◴[] No.35846627[source]
On the one hand that is the goal, on the other hand the applicable standard seems to be FIPS 140, which counts products with a flawless security history like OpenSSL amongst its long time adherents. In other words there is a non zero chance that the modules will just spit out the key if you even look at them funny.