After my old PC kicked the bucket I now own my first UEFI board and I am already having trust issues. I utilized Truecrypt's system encryption for years now and really got used to it. My new board has no legacy boot option but supports legacy devices so I was able to install Windows 7 into a MBR partition and encrypt it with Truecrypt.
But the UEFI seems really sophisticated and from what I hear it has a lot of memory available so I would like to know if it potentially compromises encryption used on this computer. I am aware of potential UEFI-malware and that is not what I want to know about.
What I'd like to know is wether UEFI does ANYTHING that would allow a potential attacker with physical access to this PC to decrypt the system or encrypted volumes used with it. Does it create any kind of potentially dangerous logs, does it create memory dumps, store keys created by the AES-NI extension of the CPU?
I would appreciate any kind of advice here!