R
Roof Fiddler
If I have a laptop with:
TPM hardware
Vista with bitlocker, set to automatically boot up using the key in the TPM
module
Vista's default security settings, including default UAC settings and
filesystem ACLs
one non-administrator account in Vista, with the password written on a
sticky note on the laptop
one administrator account with a 20-random-character password not written
down anywhere
files in the administrator's home directory which contain information worth
a couple million dollars
and this laptop is stolen by a thief who's trying to get those files, is it
realistic to expect that the thief will be unable to read them? (Assume here
that attacking the TPM module itself will not succeed.)
TPM hardware
Vista with bitlocker, set to automatically boot up using the key in the TPM
module
Vista's default security settings, including default UAC settings and
filesystem ACLs
one non-administrator account in Vista, with the password written on a
sticky note on the laptop
one administrator account with a 20-random-character password not written
down anywhere
files in the administrator's home directory which contain information worth
a couple million dollars
and this laptop is stolen by a thief who's trying to get those files, is it
realistic to expect that the thief will be unable to read them? (Assume here
that attacking the TPM module itself will not succeed.)