Page 1 of 1
Trusted Computing -- DRM to the Extreme
Posted: 2007-01-05 09:57pm
by Dave
Has anyone seen this?
FAQ on Trusted Computing
The Trusted Computing Group (TCG) is an alliance of Microsoft, Intel, IBM, HP and AMD which promotes a standard for a `more secure' PC. Their definition of `security' is controversial; machines built according to their specification will be more trustworthy from the point of view of software vendors and the content industry, but will be less trustworthy from the point of view of their owners. In effect, the TCG specification will transfer the ultimate control of your PC from you to whoever wrote the software it happens to be running.
This is every major corporation's wet dream. Somehow I'm not suprised that it exists.
Words simply fail me at the awe-inspiring BigBrother-ness of this concept.
Posted: 2007-01-06 12:05am
by phongn
At the extreme, Trusted Computing could stop you from running untrusted applications, but I doubt that'll come to pass. The worst-case I could see is that untrusted applications will be run in a sandbox. So far, Trusted Computing has mostly been used as secure storage for encryption keys.
Posted: 2007-01-06 12:13am
by Covenant
When they do, I'm switching to Linux and hacking into the matrix, where I will patch in my pirate signal to the evil, alternate interwebs.
Trusted computing may be a corporate wet dream, but if it works, wouldn't it make most machines much more secure? I'd happily WORK on a Trusted Computer when I was doing my job, but when I come home and turn on my own PC, I'd just run untrusted computers. If the networks go down and all of the routers and servers refuse to let me use an untrusted computer, that might be bad. I can't really blame a company for not wanting me to steal things or develop viruses. If they want to copy my work or something, that's bad. But I don't see that as being any of the results of this.
Posted: 2007-01-06 12:30am
by Uraniun235
Correct me if I'm wrong but I'm pretty sure that "Trusted Computing" technologies have very real, legitimate applications; specifically, computers which house or manipulate sensitive data such that it is very important that the computer has not been compromised. As such, demonizing the concept with "omfg big brother RAEG AGAINST THE MACHINE"-esque remarks is rather a bit narrow-minded.
I seriously doubt that there will be (at least within our lifetimes; feel free to masturbate furiously to your favorite far-flung cyberpunk fantasy world) a world in which nothing works without 'Trusted Computing'; there will always be markets for hardware which is free from such restrictions, and as such there will be vendors to supply that hardware.
Granted, there may be a time when a lot of major software vendors may write their programs to be incompatible with these unrestricted platforms; but then, there's nothing which says that a developer is obligated to make his software as widely compatible or available to the public as possible. Besides, by the time this dark dystopian man-eat-dog superhardcore cyberpunk world arises, surely there'd be open-source alternatives to nearly any commercial piece of software. And even if Trusted Computing were implemented to an extreme the very next morning, there'd still be a big stock of used "untrusted" hardware in the market to buy from for some time.
Even at the most extreme (and least likely), Trusted Computing threatens to be merely a big pain in the ass, and little more. Certainly not worth getting excited over.
Posted: 2007-01-06 09:34am
by Arrow
Uraniun235 wrote:Correct me if I'm wrong but I'm pretty sure that "Trusted Computing" technologies have very real, legitimate applications; specifically, computers which house or manipulate sensitive data such that it is very important that the computer has not been compromised. As such, demonizing the concept with "omfg big brother RAEG AGAINST THE MACHINE"-esque remarks is rather a bit narrow-minded.
<snip>
Even at the most extreme (and least likely), Trusted Computing threatens to be merely a big pain in the ass, and little more. Certainly not worth getting excited over.
Some of those legitimate applications include banking, corporate records keeping, protecting proprietary data and protecting national security data. Which covers several hundred thousand machines (at least), when it's all said and done.
This is not about the
The Man fucking you over and telling you how to use your computer. This is about keeping highly sensitive data that your government, the companies who's services and products you depend on, and your own financial and other records safe (if you think your financial records exist only on your computer, too you're fucking naive to be allowed out your house).
Posted: 2007-01-06 11:45am
by Dave
I heard about this from a friend. He IM'd me with the link I provided here, then when on and on about how it was the end of the world, 1984, etc.
I kept saying even worst-case-senario there will still be a free/open hardware-sofware movement (much along the lines Covenant mentioned), but he kept saying there was no way out and vendor lock-in and such.
And now that it has been mentioned, I can completely see that there are many legitimate uses for Trusted Computing. It still makes me wonder, though, how easy it would be to lock in the end-user, and on the flip side how easy it would be to counter.
Posted: 2007-01-06 01:05pm
by Darth Wong
Uraniun235 wrote:Correct me if I'm wrong but I'm pretty sure that "Trusted Computing" technologies have very real, legitimate applications; specifically, computers which house or manipulate sensitive data such that it is very important that the computer has not been compromised. As such, demonizing the concept with "omfg big brother RAEG AGAINST THE MACHINE"-esque remarks is rather a bit narrow-minded.
You are confusing end-user trusted computing (such as VPN and SSH) with software distributor trusted computing, ie- DRM.
Competent sysadmins can best handle their own system security, and DRM schemes don't do a goddamned thing to help in that respect. All they do is interfere with connectivity. There is ZERO benefit to the user; 100% of the benefit is to media companies who are afraid of their software being copied.
Posted: 2007-01-06 01:37pm
by Admiral Valdemar
People should take some responsibility in their lives and consider that if they screw up their security, they lose whatever they have to lose..
We're finally paying for the inept masses of people who can't do anything but e-mail from Outlook and surf via IE and fall for Nigeria phishing scams.
Posted: 2007-01-06 05:33pm
by Crayz9000
Admiral Valdemar wrote:People should take some responsibility in their lives and consider that if they screw up their security, they lose whatever they have to lose..
We're finally paying for the inept masses of people who can't do anything but e-mail from Outlook and surf via IE and fall for Nigeria phishing scams.
And you're expecting a software and hardware combination to finally solve a social engineering problem that has existed for as long as humanity has existed?
Have fun with the wet dreams there, Sparky.
Posted: 2007-01-06 09:28pm
by Durandal
The biggest flaw with DRM schemes is that they turn the basic precepts of cryptography on their ears. In the DRM encryption scheme, the intended recipient of the information and the attacker are the same.