Windows 11 23H2 bug causes “end of service”, “get the newer version of Windows” alerts
https://www.windowslatest.com/2024/11/13/windows-11-23h2-bug-causes-reached-the-end-of-service-get-the-newer-version-alerts/

"Get the newer version of Windows to stay up to date. Your version of Windows has reached the end of service."
Have you been getting that message and wondering what it's about? Have you seen the update notification dot but then there's nothing new on the "Windows Update" screen? Yeah, you and possibly millions of other people.

I think this happens if you're running Windows 11 on a PC without TPM. Some computers are more than 4-5 years old and don't have this option, and some people choose not to switch on TPM because they don't want it used against them for DRM or other malfeatures at a BIOS/UEFI level.

#Microsoft #Windows #MicrosoftWindows #Windows11 #Windows1123H2 #TPM #TrustedPlatformModule

Windows 11 23H2 bug causes "end of service", "get the newer version of Windows" alerts

Windows 11 KB5046633 (23H2) has a known issue that incorrectly warns users, "Your version of Windows has reached the end of service."

Windows Latest
What is a TPM and why isn’t mine working?

Öfter mal was neues. Ist wohl doch nicht so "#trusted" das #TrustedPlatformModule.
Besonders #tückisch, wenn Geräte schon vor dem #Verkauf #kompromittiert sind.

#uefischadcode #bootmalware #intel #tpm

PCs mit Intel-Prozessoren: UEFI-Sicherheitslücke lässt Schadcode passieren | heise online
https://www.heise.de/news/PCs-mit-Intel-Prozessoren-UEFI-Sicherheitsluecke-laesst-Schadcode-passieren-9773023.html

PCs mit Intel-Prozessoren: UEFI-Sicherheitslücke lässt Schadcode passieren

Aufgrund eines Fehlers in der UEFI-Firmware von Phoenix können Angreifer Computer attackieren. Davon sind unter anderem Lenovo-Geräte mit Intel-CPU betroffen.

heise online
Trusted Platform Module (TPM) - GTech Booster

A Trusted Platform Module (TPM) chip is a crucial hardware-based security component that safeguards sensitive data and cryptographic keys in computer systems. It operates in conjunction with the system's firmware and operating system, providing enhanced security even in compromised scenarios.

GTech Booster
FOSDEM 24: TPM-2-Chip als Datentresor unter Linux

Viele Rechner bieten ein Trusted Platform Modul 2. Ein Talk auf der FOSDEM24 zeigt, wie sich mit Linux-Tools dort Schlüssel hinterlegen lassen.

heise online

As far as this #TrustedPlatformModule was concerned, you're the enemy. The "trust" in trusted computing is about *other people* being able to trust your *computer*, even if they don''t trust *you*.

So that TPM does all kinds of tricks. It can observe and produce a cryptographically signed manifest of your computer's entire boot-chain, meant to be an unforgeable certificate attesting to which kind of computer you were running and what software you were running on it.

8/

Vi hade en trevlig hackträff idag, där vi pysslade med #TrustedPlatformModule och #refind, #texlive, #PlainTextAccounting i #python med mera. De flesta av oss gick sedan vidare och hängde på @dfupdate

The second CPU would be a #TrustedPlatformModule, a brute-simple system-on-a-chip designed to be off-limits to modification, even by its owner (that is, you).

The #TPM would ship with a limited suite of simple programs it could run, each thoroughly audited for bugs, as well as secret cryptographic signing keys that you were not permitted to extract.

26/

At core, here's what they envision: inside your computer, they will nest *another* computer, one that is designed to run a very simple set of programs, none of which can be altered once it leaves the factory. This computer - either a whole separate chip called a "#TrustedPlatformModule" or a region of your main processor called a #SecureEnclave - can tally observations about your computer: which operating system, modules and programs it's running.

45/