{"id":48893,"date":"2023-03-06T13:41:29","date_gmt":"2023-03-06T13:41:29","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/"},"modified":"2023-03-06T13:42:40","modified_gmt":"2023-03-06T13:42:40","slug":"two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/","title":{"rendered":"Two security flaws in the TPM 2.0 specs put cryptographic keys at risk"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<\/p>\n<div>\n<p id=\"why-it-matters\"><strong>Facepalm:<\/strong> The Trusted Platform Module (TPM) safe crypto-processor turned a subject for public debate in 2021 when Microsoft compelled TPM 2.0 adoption at the least requirement for putting in Home windows 11. The devoted {hardware} controller ought to present &#8220;further laborious&#8221; safety to knowledge and cryptographic algorithms, however the official specs are bugged. <\/p>\n<p>Safety researchers not too long ago found a few flaws within the Trusted Platform Module (TPM) 2.0 reference library specification, two harmful buffer overflow vulnerabilities that might probably impression billions of units. Exploiting the failings is barely potential from an authenticated native account, however a chunk of malware operating on an affected gadget might do precisely that.<\/p>\n<p>The 2 vulnerabilities <a href=\"https:\/\/kb.cert.org\/vuls\/id\/782720\">are tracked<\/a> as CVE-2023-1017 and CVE-2023-1018, or as &#8220;out-of-bounds write&#8221; and &#8220;out-of-bounds learn&#8221; flaws. The problem was found inside the TPM 2.0&#8217;s Module Library, which permits writing (or studying) two &#8220;further bytes&#8221; previous the tip of a TPM 2.0 command within the CryptParameterDecryption routine.<\/p>\n<p>By writing particularly crafted malicious instructions, an attacker might exploit the vulnerabilities to crash the TPM chip making it &#8220;unusable,&#8221; execute arbitrary code inside TPM&#8217;s protected reminiscence or learn\/entry delicate knowledge saved within the (theoretically) remoted crypto-processor.<\/p>\n<p class=\"img-white full\"><picture style=\"padding-bottom: calc(100% * 1206 \/ 2000)\"><source type=\"image\/webp\" data-srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2023\/03\/2023-03-06-image-6-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2023\/03\/2023-03-06-image-6-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2023\/03\/2023-03-06-image-6-j.webp 2000w\" data-sizes=\"(max-width: 960px) 100vw, 680px\"\/><img loading=\"lazy\" decoding=\"async\" height=\"1206\" width=\"2000\" alt=\"\" class=\"b-lazy\" src=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2023\/03\/2023-03-06-image-6.jpg\" srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2023\/03\/2023-03-06-image-6-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2023\/03\/2023-03-06-image-6-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2023\/03\/2023-03-06-image-6-j.webp 2000w\" sizes=\"auto, (max-width: 960px) 100vw, 680px\"\/><\/picture><\/p>\n<p class=\"tsadinc\">In different phrases, profitable exploitation of the CVE-2023-1017 and CVE-2023-1018 flaws might compromise cryptographic keys, passwords and different crucial knowledge, making safety features of contemporary, TPM-based working methods like <a href=\"https:\/\/www.techspot.com\/news\/90206-what-tpm-why-does-windows-11-require.html\">Windows 11<\/a> primarily ineffective or damaged.<\/p>\n<p class=\"tsadinc\">TPM offers a {hardware} quantity generator, safe era and storage of cryptographic keys, distant attestation with a &#8220;practically unforgeable&#8221; hash key abstract of the {hardware} and software program configuration, and different Trusted Computing capabilities. On Home windows 11, the TPM can be utilized by DRM know-how, Home windows Defender, BitLocker full-disk encryption and extra.<\/p>\n<p class=\"tsadinc\">In accordance with CERT Coordination Middle at Carnegie Mellon College, a profitable payload exploiting the vulnerabilities might run inside the TPM and be primarily &#8220;undetectable&#8221; by safety software program or units. The problem is resolved by putting in the newest firmware updates obtainable for the person&#8217;s gadget, however the course of is simpler mentioned than performed.<\/p>\n<p class=\"tsadinc\">Whereas the failings might theoretically impression billions of motherboards and software program merchandise, only a few firms have confirmed that they&#8217;re certainly affected by the difficulty so far. Chinese language firm Lenovo, the world&#8217;s largest PC producer, <a href=\"https:\/\/support.lenovo.com\/us\/en\/product_security\/LEN-118374\">acknowledged the issue<\/a> in its Nuvoton line of TPM chips. An attacker might exploit the CVE-2023-1017 flaw to trigger a denial of service situation within the Nuvoton NPCT65x TPM chip, Lenovo mentioned.<\/p>\n<\/p><\/div>\n<iframe src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/www.techspot.com\/news\/97824-two-security-flaws-tpm-20-specs-put-cryptographic.html\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Facepalm: The Trusted Platform Module (TPM) safe crypto-processor turned a subject for public debate in 2021 when Microsoft compelled TPM 2.0 adoption at the least&#8230;<\/p>\n","protected":false},"author":1,"featured_media":48894,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-48893","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Two security flaws in the TPM 2.0 specs put cryptographic keys at risk - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Two security flaws in the TPM 2.0 specs put cryptographic keys at risk - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-06T13:41:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-06T13:42:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/2023-03-06-image-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"Two security flaws in the TPM 2.0 specs put cryptographic keys at risk\",\"datePublished\":\"2023-03-06T13:41:29+00:00\",\"dateModified\":\"2023-03-06T13:42:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\\\/\"},\"wordCount\":427,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/2023-03-06-image-4.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\\\/\",\"name\":\"Two security flaws in the TPM 2.0 specs put cryptographic keys at risk - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/2023-03-06-image-4.jpg\",\"datePublished\":\"2023-03-06T13:41:29+00:00\",\"dateModified\":\"2023-03-06T13:42:40+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/2023-03-06-image-4.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/2023-03-06-image-4.jpg\",\"width\":2000,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Two security flaws in the TPM 2.0 specs put cryptographic keys at risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Two security flaws in the TPM 2.0 specs put cryptographic keys at risk - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/","og_locale":"en_US","og_type":"article","og_title":"Two security flaws in the TPM 2.0 specs put cryptographic keys at risk - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2023-03-06T13:41:29+00:00","article_modified_time":"2023-03-06T13:42:40+00:00","og_image":[{"width":2000,"height":1200,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/2023-03-06-image-4.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"Two security flaws in the TPM 2.0 specs put cryptographic keys at risk","datePublished":"2023-03-06T13:41:29+00:00","dateModified":"2023-03-06T13:42:40+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/"},"wordCount":427,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/2023-03-06-image-4.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/","url":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/","name":"Two security flaws in the TPM 2.0 specs put cryptographic keys at risk - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/2023-03-06-image-4.jpg","datePublished":"2023-03-06T13:41:29+00:00","dateModified":"2023-03-06T13:42:40+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/2023-03-06-image-4.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/2023-03-06-image-4.jpg","width":2000,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/two-security-flaws-in-the-tpm-2-0-specs-put-cryptographic-keys-at-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"Two security flaws in the TPM 2.0 specs put cryptographic keys at risk"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/48893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=48893"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/48893\/revisions"}],"predecessor-version":[{"id":48895,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/48893\/revisions\/48895"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/48894"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=48893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=48893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=48893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}