TPM design limitations and Apple-Google app store actions

Published: Oct. 4, 2021, 1:08 a.m.

This week on the Blue Security Podcast, Adam and Andy talk about two interesting topics. The first is a pentesting company's successful hack Bitlocker using a TPM limitation. They talk about why this is complicated and the mitigations for it. They also talk about Apple and Google's decision to pull a voting app from the store in Russia a day before the parliamentary elections and the effect it has on democracy.

\n

-------------------------------------------

\n

Youtube Video Link: https://youtu.be/-GNLKWTtxTI

\n

-------------------------------------------

\n

Documentation:

\n

https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-company-network

\n

https://explainxkcd.com/wiki/index.php/538:_Security

\n

https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238

\n

-------------------------------------------

\n

Contact Us:

\n

Website: http://bluesecuritypod.com

\n

Twitter: https://twitter.com/bluesecuritypod

\n

Instagram: https://www.instagram.com/bluesecuritypodcast/

\n

Facebook: https://www.facebook.com/bluesecpod

\n

-------------------------------------------

\n

Andy Jaw

\n

Twitter: https://twitter.com/ajawzero

\n

LinkedIn: https://www.linkedin.com/in/andyjaw/

\n

Email: andy@bluesecuritypod.com

\n

-------------------------------------------

\n

Adam Brewer

\n

Twitter: https://twitter.com/ajbrewer

\n

LinkedIn: https://www.linkedin.com/in/adamjbrewer/

\n

Email: adam@bluesecuritypod.com

\n\n--- \n\nSend in a voice message: https://podcasters.spotify.com/pod/show/blue-security-podcast/message