That's not how it works. Let me explain...The data processed by the TPM is separate from the OS and contained within the TPM microprocessor ONLY. With a TPM problem, backups won't help you. If a pin fails, somehow the TPM communicates that to the windows logon process that makes it give the option of using a password. No, I am not smart enough to know exactly how it does this. But when multiple people across the web complain of TPM related problems and say that they are never offered to enter a password, I have no reason to doubt them all. Anyone who has worked with computers as long as I have knows that crap can happen and does happen to screw up the normal flow of events.
Assuming you are using BitLocker: When you perform a backup, the data is decrypted on the fly so what you are actually backing up is a decrypted copy of all the data on the disk. It's exactly the same as it would be when you sit in front of the computer and access any file. say for example that you open a Word document. That document is decrypted from the disk on the fly so that you can access it. Same thing happens as you create your backup - the data is decrypted on the fly. This is why companies such as Macrium note this and recommend that you still employ encryption within their backup software.
If you are not using BitLocker: In that case, loss of the TPM doesn't matter. Your data is still safely backed up as usual and can be restored without your pin or password (the backup password would still be needed). Remember, if I have physical access to your machine, I can easily get at all your data, if you are not using disk encryption such as BitLocker, regardless of whether I have your password or pin. Your password or pin only secures access to your data if someone does not have physical access to your system.
EDIT: Just adding another example. Take a Windows disk and remove it from your computer. Plug it into another system. You can access all data easily. Doesn't matter whether or not you had a TPM unless you are using full disk encryption such as BitLocker. That is the very reason that full disk encryption exists.
My Computers
System One System Two
-
- OS
- Win11 Pro 23H2
- Computer type
- PC/Desktop
- Manufacturer/Model
- Home Built
- CPU
- Intel i7-11700K
- Motherboard
- ASUS Prime Z590-A
- Memory
- 128GB Crucial Ballistix 3200MHz DRAM
- Graphics Card(s)
- No GPU - CPU graphics only (for now)
- Sound Card
- Realtek (on motherboard)
- Monitor(s) Displays
- HP Envy 32
- Screen Resolution
- 2560 x 1440
- Hard Drives
- 1 x 1TB NVMe Gen 4 x 4 SSD
1 x 2TB NVMe Gen 3 x 4 SSD
2 x 512GB 2.5" SSDs
2 x 8TB HD
- PSU
- Corsair HX850i
- Case
- Corsair iCue 5000X RGB
- Cooling
- Noctua NH-D15 chromax.black cooler + 10 case fans
- Keyboard
- CODE backlit mechanical keyboard
- Mouse
- Logitech MX Master 3
- Internet Speed
- 1Gb Up / 1 Gb Down
- Browser
- Edge
- Antivirus
- Windows Defender
- Other Info
- Additional options installed:
WiFi 6E PCIe adapter
ASUS ThunderboltEX 4 PCIe adapter
-
- Operating System
- Win11 Pro 23H2
- Computer type
- Laptop
- Manufacturer/Model
- Lenovo ThinkBook 13x Gen 2
- CPU
- Intel i7-1255U
- Memory
- 16 GB
- Graphics card(s)
- Intel Iris Xe Graphics
- Sound Card
- Realtek® ALC3306-CG codec
- Monitor(s) Displays
- 13.3-inch IPS Display
- Screen Resolution
- WQXGA (2560 x 1600)
- Hard Drives
- 2 TB 4 x 4 NVMe SSD
- PSU
- USB-C / Thunderbolt 4 Power / Charging
- Mouse
- Buttonless Glass Precision Touchpad
- Keyboard
- Backlit, spill resistant keyboard
- Internet Speed
- 1Gb Up / 1Gb Down
- Browser
- Edge
- Antivirus
- Windows Defender
- Other Info
- WiFi 6e / Bluetooth 5.1 / Facial Recognition / Fingerprint Sensor / ToF (Time of Flight) Human Presence Sensor