Trusted Computing -- DRM to the Extreme

GEC: Discuss gaming, computers and electronics and venture into the bizarre world of STGODs.

Moderator: Thanas

Post Reply
User avatar
Dave
Jedi Knight
Posts: 901
Joined: 2004-02-06 11:55pm
Location: Kansas City, MO

Trusted Computing -- DRM to the Extreme

Post by Dave »

Has anyone seen this?

FAQ on Trusted Computing
The Trusted Computing Group (TCG) is an alliance of Microsoft, Intel, IBM, HP and AMD which promotes a standard for a `more secure' PC. Their definition of `security' is controversial; machines built according to their specification will be more trustworthy from the point of view of software vendors and the content industry, but will be less trustworthy from the point of view of their owners. In effect, the TCG specification will transfer the ultimate control of your PC from you to whoever wrote the software it happens to be running.
This is every major corporation's wet dream. Somehow I'm not suprised that it exists. :evil:

Words simply fail me at the awe-inspiring BigBrother-ness of this concept.
User avatar
phongn
Rebel Leader
Posts: 18487
Joined: 2002-07-03 11:11pm

Post by phongn »

At the extreme, Trusted Computing could stop you from running untrusted applications, but I doubt that'll come to pass. The worst-case I could see is that untrusted applications will be run in a sandbox. So far, Trusted Computing has mostly been used as secure storage for encryption keys.
User avatar
Covenant
Sith Marauder
Posts: 4451
Joined: 2006-04-11 07:43am

Post by Covenant »

When they do, I'm switching to Linux and hacking into the matrix, where I will patch in my pirate signal to the evil, alternate interwebs.

Trusted computing may be a corporate wet dream, but if it works, wouldn't it make most machines much more secure? I'd happily WORK on a Trusted Computer when I was doing my job, but when I come home and turn on my own PC, I'd just run untrusted computers. If the networks go down and all of the routers and servers refuse to let me use an untrusted computer, that might be bad. I can't really blame a company for not wanting me to steal things or develop viruses. If they want to copy my work or something, that's bad. But I don't see that as being any of the results of this.
User avatar
Uraniun235
Emperor's Hand
Posts: 13772
Joined: 2002-09-12 12:47am
Location: OREGON
Contact:

Post by Uraniun235 »

Correct me if I'm wrong but I'm pretty sure that "Trusted Computing" technologies have very real, legitimate applications; specifically, computers which house or manipulate sensitive data such that it is very important that the computer has not been compromised. As such, demonizing the concept with "omfg big brother RAEG AGAINST THE MACHINE"-esque remarks is rather a bit narrow-minded.

I seriously doubt that there will be (at least within our lifetimes; feel free to masturbate furiously to your favorite far-flung cyberpunk fantasy world) a world in which nothing works without 'Trusted Computing'; there will always be markets for hardware which is free from such restrictions, and as such there will be vendors to supply that hardware.

Granted, there may be a time when a lot of major software vendors may write their programs to be incompatible with these unrestricted platforms; but then, there's nothing which says that a developer is obligated to make his software as widely compatible or available to the public as possible. Besides, by the time this dark dystopian man-eat-dog superhardcore cyberpunk world arises, surely there'd be open-source alternatives to nearly any commercial piece of software. And even if Trusted Computing were implemented to an extreme the very next morning, there'd still be a big stock of used "untrusted" hardware in the market to buy from for some time.

Even at the most extreme (and least likely), Trusted Computing threatens to be merely a big pain in the ass, and little more. Certainly not worth getting excited over.
"There is no "taboo" on using nuclear weapons." -Julhelm
Image
What is Project Zohar?
"On a serious note (well not really) I did sometimes jump in and rate nBSG episodes a '5' before the episode even aired or I saw it." - RogueIce explaining that episode ratings on SDN tv show threads are bunk
User avatar
Arrow
Jedi Council Member
Posts: 2283
Joined: 2003-01-12 09:14pm

Post by Arrow »

Uraniun235 wrote:Correct me if I'm wrong but I'm pretty sure that "Trusted Computing" technologies have very real, legitimate applications; specifically, computers which house or manipulate sensitive data such that it is very important that the computer has not been compromised. As such, demonizing the concept with "omfg big brother RAEG AGAINST THE MACHINE"-esque remarks is rather a bit narrow-minded.

<snip>

Even at the most extreme (and least likely), Trusted Computing threatens to be merely a big pain in the ass, and little more. Certainly not worth getting excited over.
Some of those legitimate applications include banking, corporate records keeping, protecting proprietary data and protecting national security data. Which covers several hundred thousand machines (at least), when it's all said and done.

This is not about the The Man fucking you over and telling you how to use your computer. This is about keeping highly sensitive data that your government, the companies who's services and products you depend on, and your own financial and other records safe (if you think your financial records exist only on your computer, too you're fucking naive to be allowed out your house).
User avatar
Dave
Jedi Knight
Posts: 901
Joined: 2004-02-06 11:55pm
Location: Kansas City, MO

Post by Dave »

I heard about this from a friend. He IM'd me with the link I provided here, then when on and on about how it was the end of the world, 1984, etc.

I kept saying even worst-case-senario there will still be a free/open hardware-sofware movement (much along the lines Covenant mentioned), but he kept saying there was no way out and vendor lock-in and such.

And now that it has been mentioned, I can completely see that there are many legitimate uses for Trusted Computing. It still makes me wonder, though, how easy it would be to lock in the end-user, and on the flip side how easy it would be to counter.
User avatar
Darth Wong
Sith Lord
Sith Lord
Posts: 70028
Joined: 2002-07-03 12:25am
Location: Toronto, Canada
Contact:

Post by Darth Wong »

Uraniun235 wrote:Correct me if I'm wrong but I'm pretty sure that "Trusted Computing" technologies have very real, legitimate applications; specifically, computers which house or manipulate sensitive data such that it is very important that the computer has not been compromised. As such, demonizing the concept with "omfg big brother RAEG AGAINST THE MACHINE"-esque remarks is rather a bit narrow-minded.
You are confusing end-user trusted computing (such as VPN and SSH) with software distributor trusted computing, ie- DRM.

Competent sysadmins can best handle their own system security, and DRM schemes don't do a goddamned thing to help in that respect. All they do is interfere with connectivity. There is ZERO benefit to the user; 100% of the benefit is to media companies who are afraid of their software being copied.
Image
"It's not evil for God to do it. Or for someone to do it at God's command."- Jonathan Boyd on baby-killing

"you guys are fascinated with the use of those "rules of logic" to the extent that you don't really want to discussus anything."- GC

"I do not believe Russian Roulette is a stupid act" - Embracer of Darkness

"Viagra commercials appear to save lives" - tharkûn on US health care.

http://www.stardestroyer.net/Mike/RantMode/Blurbs.html
User avatar
Admiral Valdemar
Outside Context Problem
Posts: 31572
Joined: 2002-07-04 07:17pm
Location: UK

Post by Admiral Valdemar »

People should take some responsibility in their lives and consider that if they screw up their security, they lose whatever they have to lose..

We're finally paying for the inept masses of people who can't do anything but e-mail from Outlook and surf via IE and fall for Nigeria phishing scams.
User avatar
Crayz9000
Sith Apprentice
Posts: 7329
Joined: 2002-07-03 06:39pm
Location: Improbably superpositioned
Contact:

Post by Crayz9000 »

Admiral Valdemar wrote:People should take some responsibility in their lives and consider that if they screw up their security, they lose whatever they have to lose..

We're finally paying for the inept masses of people who can't do anything but e-mail from Outlook and surf via IE and fall for Nigeria phishing scams.
And you're expecting a software and hardware combination to finally solve a social engineering problem that has existed for as long as humanity has existed?

Have fun with the wet dreams there, Sparky.
A Tribute to Stupidity: The Robert Scott Anderson Archive (currently offline)
John Hansen - Slightly Insane Bounty Hunter - ASVS Vets' Assoc. Class of 2000
HAB Cryptanalyst | WG - Intergalactic Alliance and Spoof Author | BotM | Cybertron | SCEF
User avatar
Durandal
Bile-Driven Hate Machine
Posts: 17927
Joined: 2002-07-03 06:26pm
Location: Silicon Valley, CA
Contact:

Post by Durandal »

The biggest flaw with DRM schemes is that they turn the basic precepts of cryptography on their ears. In the DRM encryption scheme, the intended recipient of the information and the attacker are the same.
Damien Sorresso

"Ever see what them computa bitchez do to numbas? It ain't natural. Numbas ain't supposed to be code, they supposed to quantify shit."
- The Onion
Post Reply