On Thu, Oct 04, 2007 at 03:11:53PM +0200, [EMAIL PROTECTED] wrote: > hello everyone > > i don't know if this is the better place to post my question...whatever..i > try... > > i'm studying the TPM chip in the Trusted/Secure boot for my stage! > i red some pages from > > https://prosec.trust.rub.de/trusted_grub_details.html#howdoesitwork > > about implementation of trusted grub and i think that that is what i'm > looking for!
Hi! "Trusted Computing" is a propaganda term, designed to make you believe you can trust your computer when in fact so-called Trusted Computing is designed to make your computer obbey someone else. For this reason, it would be more accurate to refer to it as Treacherous Computing, and hence Treacherous GRUB. A Treacherous version of GRUB would be one that refuses to obbey the user, or tells another component of the system that the user is not trusted so that it can refuse to obbey her. I'm afraid we have none of that. For more details on what Treacherous Computing really is, see: http://www.gnu.org/philosophy/can-you-trust.html -- Robert Millan <GPLv2> I know my rights; I want my phone call! <DRM> What use is a phone call, if you are unable to speak? (as seen on /.) _______________________________________________ Grub-devel mailing list Grub-devel@gnu.org http://lists.gnu.org/mailman/listinfo/grub-devel