Question 1:
Can you confirm that in a full disk encryption setup like BitLocker, when we normally boot the system, use the password, and log in, the key to decrypt the disk is loaded into RAM?
If so, this means it is stored in plaintext and is vulnerable to cold boot attacks or memory dump attacks.
I ask this because I read here that the "TPM ensures that keys never get out of the system unencrypted."
This seems contradictory, as the decryption key must be loaded into RAM at some point for the system to perform disk operations. Is this understanding correct?
Question 2:
If the above is true, and the key indeed resides in RAM, what is the practical advantage of using TPM with BitLocker for full disk encryption?
In a non-TPM system encrypted with BitLocker, the user enters the password at boot to decrypt the drive. In such a case, an attacker who doesn't know the password would need to brute force it since the key isn’t stored in plaintext.
So, what makes the with-TPM setup different?
In both cases—with or without TPM—an attacker seems to face the same challenge: brute-forcing the decryption key if they can't access it directly.
Any clarification on these points would be greatly appreciated!