Aleksandar Kuktin writes:

> I'd like to point out the problem with TPM is that, since the "trust"
> chain originates with the manufacturer, or more accurately with
> whomever controls the manufacturer, you'll never be in complete control
> of the device. "Trusted computing" in this scenario means "can THEY
> trust YOUR computer to serve THEM and work against YOU"? If you can't
> change the key (all of them), or if you don't have the private key
> (all of them), you simply don't have control over the boot process

[...]

There's no such thing as perfect security.  Each of us individually
decides what level of security is sufficient for our needs.  For
the purposes of running my Plan 9 network at home, if I could do
host authentication using TPM, that would be sufficiently secure
for my needs, and a *hell* of a lot more secure than the current
scheme.

--lyndon

------------------------------------------
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/T4aedea377a3d63c1-Mdb1e33d6715468d3f1891a45
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription

Reply via email to