• Bob_S

    Bob_S

    @bob_s

    Viewing 6 replies - 1 through 6 (of 6 total)
    Author
    Replies
    • in reply to: February 2022 Patch Tuesday early reports #2424164

      Win10 AMD 5 4500 Minisforum HM-50

      Three downloaded updates on 2/28/2022 and my system came to a crawl after rebooting.

      Reimaged from backup, delayed updates and everything is back to normal.

    • in reply to: BIOS and Windows integrity and shutting down #2376026

      Unlikely any damage was done but if there was some sort of corruption, I would suspect that the date/time settings would need to be reset.  The other BIOS settings were probably at factory default settings and would remain that way.  If not, the BIOS (depends on manf) typically will throw an error message about what has to be done to recover.

      If the BIOS was at the point of looking for the boot loader for Windows and corruption occurred, you will get the infamous message about Something Went Wrong and then Windows will try to repair itself and/or present a screen with other options you can use to get the system up and running again.  That is a whole other story…

      1 user thanked author for this post.
    • in reply to: Windows 11 announced #2374659

      There’s no sense in trying to have a discussion with you when all you want to do is distort what has been said.  I searched and found a number of articles using your words of “failed or foiled ransomware attacks” and you now add “truly’. My point was, there are plenty of articles out there on that subject – proving your statement wrong.

      I did do a search and read articles about TPM providing a false sense of security but to help you out, this one was at the top of the search and I think it speaks to the point:

      What is a TPM, and Why Does Windows Need One For Disk Encryption? (howtogeek.com)

      The relevant comment on this one is ”

      “The only thing that TPM is almost guaranteed to provide is a false sense of security,” says the FAQ. It says that a TPM is, at best, “redundant”.

      https://www.alphr.com/bitlocker-without-tpm/

      “Some computers aren’t equipped with a TPM, and the argument has been made that the TPM is redundant and provides a false sense of security. So, while BitLocker would normally require a TPM to function, there are ways to activate it with software-based encryption through a longer process.”

      And the list goes on.  The point is that TPM made the headlines as a “requirement for Win11” and therefor for the masses and that has upset a lot of people because it makes for a lot of obsolete equipment.

      The CPU requirement is also creating a lot of backlash. I have Win10 Pro x64 running on a system lab rat that has an Intel Core i7 930 CPU on a Gigabyte motherboard that can run any client software I want to test and that system is 11 years old. The motherboard supports TPM and I have the module still on the shelf.

      TPM should be a choice – not a mandated requirement. As for vintage CPU’s the argument again is about security but in all my years in the computer field, I have never seen a system compromised due to a low level kernel attack.

      Security is certainly an issue and newer hardware along with numerous other methods helps minimize the chances of malware attacks.  Microsoft is enforcing a combination of new CPU’s, Secure Boot and sandboxing methods to, as they, “make a dent in ransomware”.  But we all don’t have the needs that NSA, CIA, Military, Government’s and Enterprise level users have – nor the deep pockets.

      We should demand that we have a choice to chose the level of security we want and not leave that decision to some corporation that has been unable to secure their own systems from attack and then preach to us.

      So b, I’ll leave it here. I’ve stated my opinion and that’s all it is and it is based on what I’ve read from hopefully reliable sources and my own experiences of over 40 years working on government, military and commercial systems.  Not an expert – just my opinion.

      1 user thanked author for this post.
    • in reply to: Windows 11 announced #2374571

      Wow…. Guess b is the expert here and no one else can have an opinion. You need to do a bit more research and learn that there really are others that state TPM is false security. To help you out, search on ‘Is TPM false security’.

      I think you need a break and you also need to stop trying to prove you’re better than anyone else. Smart a** replies only show your ignorance on the subject.

       

    • in reply to: Windows 11 announced #2374426

      I would suggest you do a simple search using “articles about failed or foiled ransomware attacks”

      Granted, the articles don’t make headlines like ransomware attacks do but if enterprise and gov’t entities are using TPM – then how is it that the data stolen is unencrypted and sold off?  Billions of users personal data and credentials are sold every year.

      So I just don’t see how TPM benefits security and many others think it’s a false security.

    • in reply to: Windows 11 announced #2374250

      I understand that security is the driving force for Win11 but take a look at history. TPM 1.2 was hacked long ago as well as other implementations of TPM.  We’re lead to believe that the enterprise and government market has been using TPM for years. So what has TPM accomplished and what will it do to prevent future data breaches?

      The list of major hacks and stolen data in the past year alone tells me that TPM is not a viable deterrent to ransomware. Anyone read any reports that TPM saved the day on a ransomware attack?

      So tell us again why TPM is a good thing for the masses…

      1 user thanked author for this post.
    Viewing 6 replies - 1 through 6 (of 6 total)