That only works for dTPMs. fTPMs (ie. ones built into the cpu) is safe from that attack, although they might have other weaknesses.
According to
https://security.stackexchange.com/questions/189950/how-does...
most CPUs can be controlled via JTAG, and apparently that includes many of their deep internals.
That only works for dTPMs. fTPMs (ie. ones built into the cpu) is safe from that attack, although they might have other weaknesses.