Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: cymbeline
Access to the CPUID in an Intel CPU is selectable from the BIOS. It can be shut off. Another source of keys that are not as easily protected is the TPM module. It is epoxy potted and soldered to the motherboard. The keys inside are employed to encrypt the attached hard disk so that relocating the disk to a different box yields an unreadable drive without the TPM keys.

MAC ids on network and motherboard interfaces are often in EEPROM and capable of override for spoofing purposes. Some vendors use a MAC ID as a license key. That was viable when the manufacturer generated an immutable key for the network interface. That's not the case anymore.

Finding ways to track your activity will be a perpetual cloak and dagger effort. New ones will crop up soon after you've nailed the ones you discovered.

11 posted on 01/31/2022 12:49:37 PM PST by Myrddin
[ Post Reply | Private Reply | To 6 | View Replies ]


To: Myrddin

“Finding ways to track your activity will be a perpetual cloak and dagger effort.”

I think you’re correct. You know more about what’s going on inside those boxes than I do.

My company’s IT department is all the time fiddling with security software and training.


13 posted on 01/31/2022 2:30:52 PM PST by cymbeline
[ Post Reply | Private Reply | To 11 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson