<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: mateusz834</title><link>https://news.ycombinator.com/user?id=mateusz834</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 14 Apr 2026 20:58:24 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=mateusz834" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by mateusz834 in "Bypassing disk encryption on systems with automatic TPM2 unlock"]]></title><description><![CDATA[
<p>Wouldn't this work with some kind of PKDF instead?<p>Like: Password ---> PKDF ---> PIN<p>And then Password XOR (Key from TPM) -> LUKS<p>But i guess this kind of logic is not for a bootscript, but for tools like systemcd-cryptenroll.</p>
]]></description><pubDate>Fri, 17 Jan 2025 11:39:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=42736505</link><dc:creator>mateusz834</dc:creator><comments>https://news.ycombinator.com/item?id=42736505</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42736505</guid></item><item><title><![CDATA[New comment by mateusz834 in "Bypassing disk encryption on systems with automatic TPM2 unlock"]]></title><description><![CDATA[
<p>Personally i would like a way to use TMP2 (with PIN) + password. (i.e. mode where PIN is derived from the password, but is also used to encrypt), so that i do not have to trust the TPM manufacturer.</p>
]]></description><pubDate>Fri, 17 Jan 2025 11:06:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=42736293</link><dc:creator>mateusz834</dc:creator><comments>https://news.ycombinator.com/item?id=42736293</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42736293</guid></item></channel></rss>