On Fri, 24 Jan 2003, Eugen Leitl wrote: > ---------- Forwarded message ---------- > Date: Fri, 24 Jan 2003 02:29:27 -0500 > From: Dave Farber <[EMAIL PROTECTED]> > To: ip <[EMAIL PROTECTED]> > Subject: [IP] Open Source TCPA driver and white papers > > > ------ Forwarded Message > From: David Safford <[EMAIL PROTECTED]> > Date: Tue, 21 Jan 2003 12:05:39 -0500 > To: [EMAIL PROTECTED] > Subject: [open-source] Open Source TCPA driver and white papers > > > IBM has released a Linux device driver under GPL for its TCPA chip (TPM). > The driver is available at > http://www.research.ibm.com/gsal/tcpa/ > > This page also has links to two papers, one presenting positive uses > of the chip, and the second rebutting misinformation about the chip.
Thanks Eugen, It looks like the IBM TPM chip is only a key store read/write device. It has no code space for the kind of security discussed in the TCPA. The user still controls the machine and can still monitor who reads/writes the chip (using a pci bus logger for example). There is a lot of emphasis on TPM != Palladium, and TPM != DRM. TPM can not control the machine, and for DRM to work the way RIAA wants, TPM won't meet their needs. TPM looks pretty useful as it sits for real practical security tho, so I can see why IBM wants those !='s to be loud and clear. Patience, persistence, truth, Dr. mike