In this article, we will explore how TPM2 based disk decryption works & understand why many setups are vulnerable to a kind of filesystem confusion attack. We will follow along by exploiting two (2) different real systems #linux [ https://oddlama.org/blog/bypassing-disk-encryption-with-tpm2-unlock/ ] #informatique