Is the Windows PIN sign-in option good protection in case of device theft? [duplicate]

I’ve been hearing stories about people suffering apartment break-ins. This made me think about what might be stolen from my apartment if something similar happened, and the desktop computer certainly seems like an attractive option.
My Win… Continue reading Is the Windows PIN sign-in option good protection in case of device theft? [duplicate]

Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key?

Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key? Me, owner of this laptop, how can I know the key to use to access my own laptop JTAG?

Continue reading Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key?

PCR to prevent TPM2 key unsealing in case of rogue DMA devices connected?

Security threat: physical theft of a laptop and a server that use TPM2 auto unlock FDE with LUKS. In both cases the TPM checks against some PCRs before unsealing the key. The laptop prompts for a TPM PIN, the server doesn’t. The attacker i… Continue reading PCR to prevent TPM2 key unsealing in case of rogue DMA devices connected?

Surreptitiously surveil a logged out laptop AD workstation’s keyboard with temporary physical access?

I can think of multiple ways to surveil a logged out computer with temporary physical access. The first is installing a hardware keylogger which would enable one to get all the keystrokes from it; however, hardware keyloggers on laptops ar… Continue reading Surreptitiously surveil a logged out laptop AD workstation’s keyboard with temporary physical access?