Hacker Newsnew | past | comments | ask | show | jobs | submit | Thaxll's commentslogin

What's the kind of prompt / flow to get Claude to work on those security tasks?

Same as for people. You establish what the threat model is and then have multiple approaches. For example going through all interesting operations, tracking down their inputs and data flow, then looking for edge cases along the way. If you have enough time / tokens, this becomes more of a spreadsheet/checklist exercise. The more experience you have, the better you can prioritise that list towards paths that are more likely to be disrupted.

I always wondered how this works in practice for "real time" use cases because we've seen with secure boot + tpm that we can attest that the boot was genuine at some point in the past, what about modifications that can happen after that?

A full trusted boot chain allows you to use a reboot to revert back to a trusted state after suspected runtime compromise.

The first steps look similar to secure boot with TPM.

It starts from there, then systemd takes over and carries the flag forward.

See the "features" list from systemd 257/258 [0].

[0]: https://0pointer.net/blog/


But hey, help is coming.

Narrator's voice: "Unfortunatelly, they will be waiting forever, becase that help will never come."


help will come ... but with scare quotes.

Where does sei.co.jp comes from? Why Microsoft would use that domain in the first place?

I'm willing to bet they were the first user to try and add example.com to their Outlook account, and MS then just assigned it to them without verifying they own the domain.

It's not really the domain but the registration in the MS Office Cloud. If you query who owns example.com mail you get that company.

Well Trump said it: "why it is we only take people from s**hole countries," and "why can't we have some people from Norway, Sweden, just a few? Let's have a few from Denmark."


Probably because people from Norway and Sweden aren't interested in moving to a sh...less-developed country.


I guess Denmark is going to be out of the question now.


People from Denmark, Norway, Sweden are smart enough not to come to Trump's America, that'd be the reason, if you're still wondering.


[flagged]


No, it's not. Come visit whenever you want to see :)


Highly unlikely that PSN runs Gentoo. They're using AWS.


I've no idea if Sony uses Gentoo or not, but you can definitely run Gentoo on AWS


Not PSN. Sony's Cloud Gaming service. Where they stream an entire PlayStation console to you


OP's statement matches my understanding; parts were gentoo-based at one point.


Ho no, XML.


Did you rely on the Google go tpm lib for that?


Yes, we use github.com/google/go-tpm/tpm2


TPM is really badly implemented. When you upgrade your firmware, OS, everything can go south.

Just upgrading your firmware with bitlocker enabled can brick your PC.


Windows uses full disk encryption with keys from the TPM by default.

Nobody says "disable disk encryption right away incase the tom forgets the keys". The vast majority of TPM's manage to not forget the keys.


They may not say "turn off bitlocker", but people definitely recommend backing up the recovery keys, and windows allows you to back up the key to microsoft because they know people won't actually back them up. Not sure if that happens by default, but they provide a variety of options for the recovery keys because there is definitely a non-zero chance you need them. There were several stories of this happening with the windows 10->11 upgrade push, where people were auto-updated and then scrambling to decrypt their hard drives.


If windows is encrypted with keys from the TPM anyways, then tailscale doesn't need to encrypt a second time.

Windows also bit me in the ass with this feature, but tailscale not enabling encryption wouldn't have helped one iota.


Local software could be stealing plaintext secrets from your encrypted disk. Physical access is not the only attack vector.


The only way to protect against that is if a secure application boundary is enforced by the operating system. You can make it harder for other programs to uncover secrets by encrypting them, but any other application can reverse the encryption. I don't believe using the tpm meaningfully changes that situation.


I'm curious. If the motherboard with the TPM dies, you're basically locked out of your data right? Keys backed up on MS server or not.


No, the backed up keys (MS server, file, printed) give you full access, they contain the full encryption key.


I suspect that they do not actually contain the encryption key. It is more convenient if the disk encryption key is stored on the disk, but separately encrypted. You actually want to store the key multiple times, one for each unlock method. If the disk can be unlocked with a password, then you store the key encrypted using the password (or encrypted using the output of a key derivation function run on the typed password). If it can be unlocked with a smartcard, then you store a copy that is encrypted using a key stored in the card. When Bitlocker uses the TPM, it no doubt asks the TPM to encrypt the key and then stores that on the disk. To decrypt the disk it can ask the TPM to decrypt the stored key, which will only succeed if the TPM is in the same state that it was in when the key was encrypted.

The reason it's done this way is to allow multiple methods of accessing the disk, to allow the encryption password to be changed without having to rewrite every single sector of the disk, etc, etc. You can even “erase” the disk in one swift operation by simply erasing all copies of the key.


That is also required for any kind of key rotation to work, you're getting new key for a key, because alternative of using key directly would mean re-encrypting the whole drive when it changes and of course only having single one instead of multiple


So if you’re using the TPM based encryption you’d better have a working backup system.

How many home users have that? How many stories of personal data loss are we going to hear as windows 11 ready PCs start to die?


Working backups are important regardless, but if you use a TPM then you’d better have your recovery keys somewhere convenient. I’m sure you can print them out and keep them in your wallet or something.


don't worry, ms pushes users to just put data on onedrive, they will start losing data far before machines actually die. We already had plenty of stories of that mess.

https://boingboing.net/2026/01/05/everyone-hates-onedrive-mi...


> TPM is really badly implemented. When you upgrade your firmware, OS, everything can go south.

Could you elaborate ? Firmware/OS should not affect TPM contents ? Otherwise e.g. TPM-reliant Windows installs would break ?

In addition there are cloud scenarios where your VM has a TPM and you want to e.g .stop a malicious actor poaching your VM and running it elsewhere.

Having the tailscale TPM tied to your cloud hypervisor prevents the "lift and shift" attack.


Everytime I have to upgrade my MB firmware it breaks bitlocker and I have to either use restoring keys from microsoft website or disable bitlocker encryption before the upgrade.

https://www.reddit.com/r/MSI_Gaming/comments/15w8wgj/psa_tpm...


You cant reliably store secrets in tpm and expect it to work after an os update. Windows is using workarounds during windows update to avoid breaking bitlocker.

https://learn.microsoft.com/en-us/windows/security/hardware-...


You are correct. Updating the firmware or the OS does not actually erase the TPM. What is really going on is that the TPM register holds a value that is like a hash. Each time you measure the system state you update the register with a hash of the previous value and the measurement. When you ask the TPM to hold a key you specify which register value is used to encrypt the key. Later when you use the key it will fail if the TPM cannot decrypt the key. This can only happen if the TPM register has the wrong value, which can only happen if someone has tampered with the system. But voluntarily upgrading the BIOS or the OS looks exactly like tampering.

The correct procedure is to unlock the keys, copy them out of the TPM, perform the upgrade, reboot to remeasure the system state, then finally store the keys back into the TPM.


Wouldn't you want TPM to brick the machine if the firmware was modified? If something or someone modified your firmware, do you want the TPM key to remain intact? Its something you need to be aware of when upgrading firmware, disable encryption that relies on TPM or make a backup copy of the key.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: