Thinkvantage's Secure Chip usefulness for REAL security???

T60/T61 series specific matters only
Post Reply
Message
Author
Crunch
Senior Member
Senior Member
Posts: 713
Joined: Sun Oct 07, 2007 7:41 pm
Location: Southern California

Thinkvantage's Secure Chip usefulness for REAL security???

#1 Post by Crunch » Fri Jan 04, 2008 9:15 am

Hey all...:)

I would like to acquire some knowledge and opinions as to what you all think about the significance, or lack thereof, the embedded SecureChip, the TPM, Client Solution (Password Manager, etc.)?

I do like and use the APS (Active Protection system), for its obvious usefulness to protect the hard drive from damage. I also use the Fingerprint reader for the convenience factor. One swipe takes me from pre-desktop authentication and its 2 passwords (BIOS, and HD) as well as the Windows logon, all the way to my desktop.

Now, about the secure chip. In theory, I can see that passwords being stored on any hardware-based security, such as the embedded chip could be far superior to any software security solution. And again, the convenience of storing passwords, which I used to make a policy to NEVER do, but again, being that it is hardware based, should I go ahead and "trust" it? Will it slow down my system at all? If so, how bad?

Thanks everyone...
15-inch Core 2 Duo ThinkPad T60p | Ivy-Bridge (Late-2012) Mac mini w/ quad Core i7-3615QM 2.3GHz, 16GB DDR3-1600MHz RAM, 240GB+180GB Intel 520 Series SATA III SSD's, 5x3TB Drobo 5D

WilsonF
**SENIOR** Member
**SENIOR** Member
Posts: 198
Joined: Wed May 19, 2004 2:29 pm
Location: Chicago

#2 Post by WilsonF » Fri Jan 04, 2008 12:36 pm

The TPM is writable media bonded to the system board and to its covering in such a way that accessing hte TPM media to read it without the password should destroy the media and probably the system board as well.

It is possible for a sufficiently well-equipped lab to uncover the writable media on the TPM chip without destroying the media and to read whatever is on the media. However, the labs are very expensive and the work is very difficult to perform. The data (your passwords and other stuff) on a TPM probably are safe from everyone except government agencies and very large electronics companies that have their own labs. This is why MS and other security sites state that TPM chips are vulnerable to "certain hardware attacks" or words to that effect.
Wilson
Since 1993, TP 720, 760, 760 CD, 770, A22p, T22, X23 (still fully functional), T40p, T42p, T43 (this and subsequent systems all still in use), T60p, X60T, T61p, X61T, T500 (switchable graphics), X201T, X220

Post Reply
  • Similar Topics
    Replies
    Views
    Last post

Return to “ThinkPad T6x Series”

Who is online

Users browsing this forum: No registered users and 15 guests