Aleksandar Kuktin writes: > I'd like to point out the problem with TPM is that, since the "trust" > chain originates with the manufacturer, or more accurately with > whomever controls the manufacturer, you'll never be in complete control > of the device. "Trusted computing" in this scenario means "can THEY > trust YOUR computer to serve THEM and work against YOU"? If you can't > change the key (all of them), or if you don't have the private key > (all of them), you simply don't have control over the boot process
[...] There's no such thing as perfect security. Each of us individually decides what level of security is sufficient for our needs. For the purposes of running my Plan 9 network at home, if I could do host authentication using TPM, that would be sufficiently secure for my needs, and a *hell* of a lot more secure than the current scheme. --lyndon ------------------------------------------ 9fans: 9fans Permalink: https://9fans.topicbox.com/groups/9fans/T4aedea377a3d63c1-Mdb1e33d6715468d3f1891a45 Delivery options: https://9fans.topicbox.com/groups/9fans/subscription