On Mon, Dec 22, 2014 at 05:23:30PM -0600, T.J. Duchene wrote:
> 
> On 12/22/2014 3:44 PM, Joe Awni wrote:
> >
> >
> >IMO, the amplitude of potential TPM-nightmare scenarios should give a clue
> >about the strength of the technology.
> >IE: If it can do that in the "wrong-hands," what can it do in the right?
> >
> >
> Hi Joe!
> 
> What can it do in the right? Nothing that can't be done without the TPM
> chip.  One of the first things that you learn in computer engineering is
> that anything problem can be solved on software or hardware.  The only
> difference is a question of efficiency.
> 
> The TPM chip is specifically designed to act as a hardware safeguard against
> user intervention in software.  It's intended to provide certain facilities
> that already exist in software.  The purpose in putting them in hardware is
> to limit your access to them, so that you - the user - cannot personally
> override them.

A couple years ago I saw a package in the Debian squeeze repositories
that uses the TPM to check for rootkits/viruses.
As I have never owned any hardware with a TPM*, I did not investigate
any further.

* All my computers were made from cheap parts designed in 2008 or earlier, 
as far as I can tell.

HTH,
Isaac Dunham
_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to