On Saturday 19 April 2008, Robert Millan wrote:
> You think remote attestation is voluntary, but by its nature it cannot be
> made voluntary.  Voluntary means I can refuse to participate without giving
> the challenger any information about my system.  However, my refusal to
> participate *IS* already information.  In fact, if you add to it another
> piece of information -- namely, the (future) fact that everyone has a
> complete Treacherous stack --, what do you get?  Right!  You get the
> ability to distinguish who is running your CrapWare 2000[tm] DRM program
> and who isn't.
>
> Which means that in the future (unless computer users reject it outright),
> DRM proponents will have a very powerful tool in order to coerce everyone
> into using the anti-features they put in their programs (which obviously
> nobody *wants* to have, that's why they have to make it so confusing).

   I think you're right about TPM, Robert.  :-/

   I recently acquired a laptop that came with a TPM chip; thankfully I was 
aware of what TPM was indended to be used for and had read warnings on the 
matter from privacy advocates.  The laptop came with Vista preloaded, which 
asked a vague [and perhaps intentionally misleading] question, something 
along the lines of: "This device has a TPM chip which has not yet been 
activated, would you like to activate it now?  It will help security if you 
do."  [To which I answered NO.]

   And in the BIOS settings, sure enough there are some TPM feature settings 
that are very clearly not to the benefit of the user/owner:

   Security Reporting Options: (each below has enable/disable option)
      BIOS ROM String Reporting
      ESCD Reporting
      CMOS Reporting
      NVRAM Reporting
      SMBIOS Reporting
   Clear Security Chip (enable/disable)
      Note says: "It will not be possible to access already-encrypted data
                  after these keys are cleared"

   I think it's pretty clear that the intent is to report the above 
information to the OS manufacturer rather than to the user or owner.

   -- Chris

-- 

Chris Knadle
[EMAIL PROTECTED]


_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
http://lists.gnu.org/mailman/listinfo/grub-devel

Reply via email to