You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Windows (bootloaders and userland) saves a bunch of entropy to UEFI variables, under GUID eaec226f-c9a3-477a-a826-ddc716cdc0e3 (aka EfiIDNamespaceVariable) - this could be used to seed an RNG alongside device path if present:
UnlockID (boot services only) and UnlockIDCopy (boot and runtime services) - 32 bytes of data coming out of UEFI CSPRNG services, used to ensure a device-specific secure boot policy (etc) is intended for the correct system, set by bootmgr
OfflineUniqueIDEKPub - set in various places, if TPM is present, to the TPM endorsement key public key
OfflineUniqueIDRandomSeed - set in various places, if TPM isn't present, to 32 bytes of data coming out of BCrypt CSPRNG
At least some or all of these may be present as long as windows has booted on a system once.