>On Fri, 28 Mar 2025 12:26:37 -0700
>"Lyndon Nerenberg (VE7TFX/VE6BBM)" <lyn...@orthanc.ca> wrote:
>
> ron minnich writes:
> 
> > I figure that at some point somebody is going to come in and show
> > us a better way to do it. Should that happen, it's good to be aware
> > of just how real the threats are. So I thought it would be nice to
> > know, and possibly interesting as well.
> 
> Perhaps it's time to integrate TPM?  That's been in the back of
> my mind for a long time, but I have never had suitable hardware
> to trying monkeying around with it.  (That might change soon.)
> 
> --lyndon

Hi all! A long-time lurker here.

I'd like to point out the problem with TPM is that, since the "trust"
chain originates with the manufacturer, or more accurately with
whomever controls the manufacturer, you'll never be in complete control
of the device. "Trusted computing" in this scenario means "can THEY
trust YOUR computer to serve THEM and work against YOU"? If you can't
change the key (all of them), or if you don't have the private key
(all of them), you simply don't have control over the boot process, and
if you don't have control over the boot process, you simply have no
control over the machine whatsoever. The machine can and will turn
against you when it's true masters order it to.

Then there's the entire thing about "war against general
computing". Etc. This all is generally discussed under the heading
"technofeudalism".

-- 
Svi moji e-mailovi su kriptografski potpisani. Proverite ih.
All of my e-mails are cryptographically signed. Verify them.
--
You don't need an AI for a robot uprising.
Humans will do just fine.
--

Attachment: signature.asc
Description: PGP signature

------------------------------------------
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/Tbd230a8f010208d8-Mf2d73ed41ad414db5c2616ad
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription

Reply via email to