Hacker News new | past | comments | ask | show | jobs | submit login

If they stole the laptop, they also stole the TPM inside the laptop, so having the key stored there doesn't help.



True. I was thinking they'd be using their centralized accounts once they reach the OS logon screen, thus no post-it necessary, but maybe that's not the case.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: