On 10/02/07, Michael Sparks wrote:

> On Friday 09 February 2007 18:26, Tim Thornton wrote:
>...
> > I can trust your computer not to reveal my secrets to you,
>
> Do you not see how this is a bad thing - how this can be abused?
>
> I buy a car. It does what I tell it (well it would if I drove). I buy
> a hammer it bangs what I want to bang. I buy a phone. It phones where
> I tell it. I buy a general purpose computer,  it does what I tell it.
> Or should. I need to be able to trust *my* machines, if it doesn't do
> what I tell it,  I can't trust it. I don't want *my* property keeping
> secrets from me.

Your machine will do what you tell it to. It's just that there are
secrets you can't access. That includes your secrets, you just get to
use the result of their manipulation. This is good, because *your*
property is keeping your secrets safe from rogue applications/viruses.

As well as the ability to store secrets, the TPM also has some other
abilities. It can "measure" the system as it boots, so you can be sure
that the operating system and application loaded are what you're
expecting. It also contains a monotonic counter - that's a counter that
will only increment. That allows protection against replay attacks,
where for example the system clock is rolled back to enable some demo
software to be used for longer than the trial period.

> If you do not trust me, but wish to deliver it by machine, then it is
> up to you to provide to me a machine *you* trust,  it is not up to me
> to provide *you* a machine that you trust. 

If you are willing to provide me with a machine that I can trust, then I
can deliver to you by machine. If you're not willing to provide that, we
can agree to not transact.

If the music industry are willing to deliver songs to you by machine,
isn't it for you to provide that machine if you want to take advantage
of that offer? Unfortunately, I had to buy my own CD player... ;)

> Also, its a false "trust".  Your "secret" is audio and video.  That's
> not a secret at all. 

In the DRM case, the secret is a rights object. That contains a
decryption key and information about what you're allowed to do (number
of plays, key validity). The plaintext audio/video is not nearly as
valuable.

> BTW, I'm not arguing the /technology/ is broken. After all, using the
> same technology  you can make things like secure personal storage are
> more secure and trustable by the user:
>    * http://www.linuxjournal.com/article/6633

Now we're on the same page... :)

Tim

-- 
IMPORTANT NOTICE: The contents of this email and any attachments are 
confidential and may also be privileged. If you are not the intended recipient, 
please notify the sender immediately and do not disclose the contents to any 
other person, use it for any purpose, or store or copy the information in any 
medium.  Thank you.



-
Sent via the backstage.bbc.co.uk discussion group.  To unsubscribe, please 
visit http://backstage.bbc.co.uk/archives/2005/01/mailing_list.html.  
Unofficial list archive: http://www.mail-archive.com/backstage@lists.bbc.co.uk/

Reply via email to