Store it in hdd encrypted by TPM:s public key for example. TPM:s private key is required to decrypt it. Voila.
Good point(s).

Well, the tokes are there and since there is only information saying that the tokes related to Windows Hello are encryptedâŚso the other tokens dont seem to be by this logic. If they where, it would have been sayed.
Ofcourse they do, if they are encrypted (with encryption with Windows Hello), extracting them from the computer does not help attacker at all of gaining the database from the servers. He needs unencrypted session tokens to do that.
You are mixing two different things:
- Being able to (locally) access the computer
- Being able to access the servers (remotely)
Yes, ofcourse he could then just copy the encrypted database directly from hdd, if he could. But then he really had to do it directly from the hdd then. But to get the database from the server, that could be done remotely at later time and some other location. ALSO, local database could be further encrypted by user by something the attacker cant get access to, while the database on the server is only encrypted by users passphrase to be exact.
Two different things, different attack vectors.
Wrong. If Im using actual biometrics then its the weakest link, since there has been numerous vulnerabilities in the Windows Hello biometrics (as I mentioned: For example they store encryption keys unprotected in the biometric device, like fingerprint reader and it can be extracted there, completely opening the whole security and everything that it is based on). ALSO, anyone can steal anyones biometrics pretty easily, especially fingerprints.
But if Im using PIN, there is no way for you to steal it from my anything that I touch (like fingerprint) or by just taking a picture of my face with special camera (like facial recognition)âŚyou really have to guess it or use some keylogger on my computer to get it. Also, the PIN is NOT stored unsecured in some crappy POS device where it can be easily extracted, its stored securely in security chip called TPM. Yes, there have been some vulnerabilitys in some TPM:s, but nothing that bad like there have been in those fingerprint readers and cameras used in Windows Hello biometrics.
Ofcourse, if my pin is bad, then all bets are off. But if its good, then there is pretty much no way around it, not atleast as easy ways as there are around Windows Hello biometricsâŚTPM has anti-hammering protection for PIN guessing.
Windows Hello should be improved, in my opinion, by allowing to use 2 different things in it, for example both PIN and fingerprint to open whateveritisprotecting. Or having the ability to use like 2 out of 4, 3 out of 4, 4 out of 4, etc. combinations, whatever you like. Personally I would love to have option to use Yubikey (with or without PIN) + EITHER face or fingerprint to open. This could easily be accomplished by using things like Shamirs secret sharing etc.