:: Re: [Dng] TPM
トップ ページ
このメッセージを削除
このメッセージに返信
著者: Joe Awni
日付:  
To: dng
題目: Re: [Dng] TPM
I didn't want to go down this thread, but i feel compelled to respond to
the non-sense and hysteria surrounding TPM. As i said before, they are
stuffing your open mind with rubbage.

TPM is not part of Ethernet.
Perhaps it's been mistaken for IPMI / BMC ( which btw does have known holes
["so if you trust IPMI..."] ).

To those who would not "trust" a TPM in their computer:
Trust is not a binary phenomenon. There are degrees of truest.
It seems over the years some people have built trust with proprietary and
closed hardware components in their computer because your CPU, Video Card
GPU, BIOS, Ethernet Controller, IPMI's BMC, etc. are all closed hardware (
unless you are using a Letux 400 ).

Open hardware is rather rare, but anyone can build an open hardware TPM
because the specification and documentations are Open and avail from the
Trusted Computing Group (
http://www.trustedcomputinggroup.org/resources/tpm_main_specification ).
Specifically, this link includes documentations of the functions available
on the chip so you can make use of these in your own applications(s). So
that guy who said, "that the functionality is not open documented" is
completely wrong.

I agree that until an Open Hardware implantation comes out i would not use
it to store, for example, Santa Clause's list of naughty boys. But, i am no
more worried about a malicious backdoor in the TPM than in any other
component.

---
Disclaimer: I dont support this, but if you are genuinely freaking-out
about TPM. Check if you have on in you computer already and follow these
instructions to disable it:
http://www.thinkwiki.org/wiki/Embedded_Security_Subsystem#Using_the_Embedded_Security_Subsystem
also note: "it is also useless for DRM and other Treacherous Platform
corporate ideas."
---