• RobotToaster@mander.xyz
    link
    fedilink
    English
    arrow-up
    151
    arrow-down
    1
    ·
    edit-2
    6 months ago

    Only for the IOT version which is for devices like ATMs, but it kinda torpedoes their argument that a TPM is hard requirement for windows 11.

    • BearOfaTime@lemm.ee
      link
      fedilink
      English
      arrow-up
      12
      ·
      edit-2
      6 months ago

      I’ve run I run the IoT version of 10 on everything - laptop, desktop, VM’s, etc, it’s great because it only does updates 2x/year, no feature updates by default.

      Licensing is handled by the scripts from Microsoft. If you’re a large enough business, it would be worth the cost of the Enterprise licensing just in reduced support issues.

      Basically, it’s Windows without the bloat, which seems like a good thing. I can use whatever apps I want for photo viewer, etc, and no garbage on the system.

  • dinckel@lemmy.world
    link
    fedilink
    English
    arrow-up
    60
    ·
    edit-2
    6 months ago

    If anything, it should be optional for personal use, and mandatory for enterprise. Not that they would come to this conclusion either way, granted that half of the workforce is busy putting ads into the start menu, and the other half are probably not doing any work whatsoever

    • barsquid@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      6 months ago

      If you don’t have TPM how can they do browser attestation and ensure you have no ad blocking software?

    • herrcaptain@lemmy.ca
      link
      fedilink
      English
      arrow-up
      7
      ·
      6 months ago

      It’s been quite a while, but on an older system years ago I recall it slightly nagging me about how the computer wasn’t W11-enabled.

    • catloaf@lemm.ee
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      6 months ago

      I’ve been curious about people who have been disabling the TPM. Where are you storing your disk encryption keys?

      • AMillionMonkeys@lemmy.world
        link
        fedilink
        English
        arrow-up
        13
        ·
        6 months ago

        I’m not using disk encryption. It’s a desktop and if it’s every stolen I’ve got bigger problems.
        Also, I presume that disk encryption makes it so you can’t just pop the drive in an adapter and pull stuff off it, which I sometimes need to do with old, retired drives.

      • AWildMimicAppears@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        4
        ·
        6 months ago

        veracrypt is a thing, encrypting drives does not need TPM.

        Just boot using the good old Master Boot Record for a clean solution (The Veracrypt documentation gives a good overview). Veracrypt works with EFI too, but the EFI partition itself cannot be encrypted. You can even create a hidden OS, if you are forced to give out your password, theres still plausible deniability.

        • BearOfaTime@lemm.ee
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          6 months ago

          Thanks for the Veracrypt reminder. Adding that to my stuff to setup and document list.

          Sometimes Bitlocker really pisses me off.

      • lud@lemm.ee
        link
        fedilink
        English
        arrow-up
        1
        ·
        6 months ago

        You can run bitlocker without TPM using a usb flash drive instead. I think you can also store the key in your mind as a password.

        • catloaf@lemm.ee
          link
          fedilink
          English
          arrow-up
          2
          ·
          6 months ago

          Yes, but when they’re on USB the keys are much more accessible. You can just plug it in and dump them.

          If you’re only using a password, the keys are stored in an unencrypted part of the drive, which can again easily be dumped.

          Once you’ve dumped the keys, you can brute-force the passphrase offline.

    • yggstyle@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      4
      ·
      edit-2
      6 months ago

      I found it was pretty easy to get rid of the nag. I installed a different OS. For my development stuff that needs windows and I can’t run with wine (very few tools) - I have a VM running a windows version with 0 Internet access. Fuck that company sideways.

  • downpunxx@fedia.io
    link
    fedilink
    arrow-up
    26
    arrow-down
    3
    ·
    6 months ago

    the most expected step back in the history of step backs, people were calling this day one hour one of seeing the W11 requirements, and knowing the vast majority of users were not going to simply “buy another machine” for the honor of running the latest copy of windows when windows 10 works perfectly well lol

      • downpunxx@fedia.io
        link
        fedilink
        arrow-up
        7
        ·
        6 months ago

        choo choo the microsoft enshitification train has left the station boys, it’s only major fuckup then triage from here on out for the rest of time, all aboard, choo choo

  • NeoNachtwaechter@lemmy.world
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    5
    ·
    6 months ago

    This one big question around the T in TPM, has anyone found a satisfying answer yet?

    T is for “trusted”. So far it was easy.

    But who is supposed to trust whom?

    The only case I found plausible so far is, that M$ can now decide whether or not they want to trust your PC (against you, the user).

    • towerful@programming.dev
      link
      fedilink
      English
      arrow-up
      17
      arrow-down
      1
      ·
      6 months ago

      I’m sure this is a meme, but the trust is proving the OS is not tampered with.
      Like, if malware was able to inject a malicious windows update URL into the OS, and inject a malicious certificate that gets the OS to trust the malicious updates by the malicious URL.
      The signature of the OS would then differ from what the TPM/CPU recorded during OS boot and what the TPM/CPU has hashed during running. This would indicate that the OS has been tampered with.
      So the trust in TPM is that the TPM and CPU are working together correctly (which is certified during manufacturing), so that the TPM can then attest that the OS (or software or whatever) hasn’t been tampered with.

      So yeh, it’s MS (or whatever software company) trusting that the software it is interacting with is running as it is intended

    • catloaf@lemm.ee
      link
      fedilink
      English
      arrow-up
      11
      arrow-down
      1
      ·
      6 months ago

      Honestly, the user is the biggest security risk in the first place. People run all kinds of malware and put their passwords into phishing sites all the time. One thing a TPM is used for is secure boot, which prevents malware from inserting its own bootloader to take over the OS.

      • NeoNachtwaechter@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        10
        ·
        6 months ago

        the user is the biggest security risk

        Of course LOL

        The user of a hammer is the only one who can destroy the hammer. Humans on the planet’s surface are the only ones who can destroy the planet… we should definitely separate the human user from his rights and freedom, shouldn’t we?

  • Lemming421@lemmy.world
    link
    fedilink
    English
    arrow-up
    9
    ·
    6 months ago

    The last time I tried to install Windows 11 on a VM (Nutanix AHV), I had to fiddle with a virtual TPM and lost the live migration feature as a result.

    Dos this mean I can install the LTSC version, not need the TPM and have a working, live migrate-able machine?

    Something to test next week…

    • ramble81@lemm.ee
      link
      fedilink
      English
      arrow-up
      14
      ·
      6 months ago

      There’s a registry key (sorry I’m on mobile right now) that you can actually add during a clean setup of current non-LTSC versions that remove the requirement for vTPM and SecureBoot. That install should easily be able to be live migrated. We were doing that when first playing with Windows 11

  • kubica@kbin.social
    link
    fedilink
    arrow-up
    5
    arrow-down
    4
    ·
    6 months ago

    So they are lowering the specs because people has found a way to avoid upgrading?

    • Evilcoleslaw@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      6 months ago

      They are lowering the specs for this one version that’s only available to license to Enterprise users because it’s meant for Enterprise level IoT use cases, not as a typical desktop.

  • FaceDeer@fedia.io
    link
    fedilink
    arrow-up
    7
    arrow-down
    12
    ·
    6 months ago

    Oh no, they accommodated our desires and removed the requirement that we hated. The bastards.

    • Cethin@lemmy.zip
      link
      fedilink
      English
      arrow-up
      19
      ·
      6 months ago

      They didn’t though, unless you want to run the IoT (internet of things) version, which is for integrated devices. That’s why storage size matters.

      This isn’t my largest complaint with W11, and I don’t think it’s many other’s either. I don’t run windows though, so I don’t really care.