Re: Challenge to David Wagner on TCPA

2002-08-02 Thread James A. Donald

 --
On 2 Aug 2002 at 0:36, David Wagner wrote:
 For instance, suppose that, thanks to TCPA/Palladium, Microsoft 
 could design Office 2005 so that it is impossible for StarOffice 
 and other clones to read files created in Office 2005.  Would 
 some users object?

In an anarchic society, or under a government that did not define 
and defend IP, TCPA/Palladium would probably give roughly the 
right amount of protection to intellectual property by technical 
means in place of legal means.

Chances are that the thinking behind Palladium is not Let us sell 
out to the Hollywood lobby but rather Let us make those !@#$$%^ 
commie chinese pay for their *^%$## software.

Of course, in a society with both legal and technical protection 
of IP, the likely outcome is oppressive artificial monopolies 
sustained both by technology and state power.

I would certainly much prefer TCPA/Palladium in place of existing
IP law.  What I fear is that instead legislation and technology
will each reinforce the other. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 R66NXPp5xZNDYn98jcVqH5q22ikRRFR3evv5xfwF
 2PNka92tYm9+/iBKaR+IcOoDA8BwXZlwcPD18Ogw8




Re: Freedom of association denied in Ventura Cty

2002-08-02 Thread Steve Furlong

On Thursday 01 August 2002 15:46, Major Variola (ret) wrote:

 Dress Code Keeps 9 Hells Angels Out of Fair in Ventura
 Security: The new policy is enforced after biker club members refuse
 to remove vests marked with group's insignia. Their leader says he
 will sue.

Is it just me, or does I'll see you in court lack the impact of I'll 
make your bitch squeal?

-- 
Steve FurlongComputer Condottiere   Have GNU, Will Travel

Vote Idiotarian --- it's easier than thinking




TCPA

2002-08-02 Thread James A. Donald

--
In an anarchist society, or in a world where government had given 
up on copyright and intellectual property, TCPA/Palladium would be 
a great thing, a really good substitute for law, much more
effectual, much cheaper, and much less dangerous than law.

In a world where we have anticircumvention laws and ever growing 
patent and copyright silliness, it seems a dangerously powerful 
addition to law. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 6FaJusAR8fMsVvaFm9l3vbuyiQwio/YrBFLpyT6c
 2Db/Fk0MeNi3mjdoDTo2IGzHeelYts0/xqiEjUFmA




Re: Challenge to David Wagner on TCPA

2002-08-02 Thread David G. Koontz

Jon Callas wrote:
 On 8/1/02 1:14 PM, Trei, Peter [EMAIL PROTECTED] wrote:
 
 
So my question is: What is your reason for shielding your identity?
You do so at the cost of people assuming the worst about your
motives.
 
 
 Is this a tacit way to suggest that the only people who need anonymity or
 pseudonymity are those with something to hide?
 



RE: Challenge to David Wagner on TCPA

2002-08-02 Thread Trei, Peter

 Jon Callas[SMTP:[EMAIL PROTECTED]]
 
 
 On 8/1/02 1:14 PM, Trei, Peter [EMAIL PROTECTED] wrote:
 
  So my question is: What is your reason for shielding your identity?
  You do so at the cost of people assuming the worst about your
  motives.
 
 Is this a tacit way to suggest that the only people who need anonymity or
 pseudonymity are those with something to hide?
 
 Jon
 
Not really. However, in todays actual environment, this is frequently 
true that those with something to hide use anonymity. 

While some people have maintained nyms for many years (I can't
think of anyone maintaining explicit stong anonymity right now,
actually - remember Sue D. Nym? ),  and used them to talk about 
a variety of issues, it's pretty rare.

It's rare enough that when a new anononym appears, we know
that the poster made a considered decision to be anonymous.

The current poster seems to have parachuted in from nowhere, 
to argue a specific position on a single topic. It's therefore 
reasonable  to infer that the nature of that position and topic has 
some bearing on the decision to be anonymous.

Since the position argued involves nothing which would invoke the
malign interest of government powers or corporate legal departments, 
it's not that. I can only think of two reasons why our corrospondent
may have decided to go undercover... 

1. If we know who he/she/them were, it would weaken the argument
(for example, by making it clear that the poster has a vested interest
in the position maintained, or that 'AARGH! is the group effort of an
astroturf campaign).

2. If the true identity of the poster became known, he/she/them
fears some kind of retribution:
* The ostracism and detestation of his peers.
* The boycotting of his employer. 
* His employer objecting to his wasting company time on 
  Internet mailing lists.

Our corrospondent has not given us any reason not to 
infer the worst motives. This is, after all, a discipline where
paranoia and suspicion are job requirements.

Peter Trei
Disclaimer: The above represents my private , personal 
opinions only; do not misconstrue them to represent the 
opinions of others.




Re: Challenge to David Wagner on TCPA

2002-08-02 Thread Jon Callas

On 8/1/02 1:14 PM, Trei, Peter [EMAIL PROTECTED] wrote:

 So my question is: What is your reason for shielding your identity?
 You do so at the cost of people assuming the worst about your
 motives.

Is this a tacit way to suggest that the only people who need anonymity or
pseudonymity are those with something to hide?

Jon




RE: Challenge to David Wagner on TCPA

2002-08-02 Thread James A. Donald

--
On 2 Aug 2002 at 10:43, Trei, Peter wrote:
 Since the position argued involves nothing which would invoke
 the malign interest of government powers or corporate legal
 departments, it's not that. I can only think of two reasons why
 our corrospondent may have decided to go undercover...

I can think of two innocuous reasons, though the real reason is
probably something else altogether:

1.  Defending copyright enforcement is extremely unpopular because
it seemingly puts you on the side of the hollywood cabal, but in
fact TCPA/Paladium, if it works as described, and if it is not
integrated with legal enforcement, does not over reach in the
fashion that most recent intellectual property legislation, and
most recent policy decisions by the patent office over reach.

2..  Legal departments are full of people who are, among their
many other grievious faults, technologically illiterate.
Therefore when an insider is talking about something, they cannot
tell when he is leaking inside information or not, and tend to
have kittens, because they have to trust him (being unable to tell
if he is leaking information covered by NDA), and are
constitutionally incapable of trusting anyone. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 Alf9R2ZVGqWkLhwWX2H6TBqHOunrj2Fbxy+U0ORV
 2uPGI4gMDt1fTQkV1820PO3xWmAWPiaS0DqrbmobN




RE: Challenge to David Wagner on TCPA

2002-08-02 Thread Jay Sulzberger

On Fri, 2 Aug 2002, James A. Donald wrote:

 --
 On 2 Aug 2002 at 10:43, Trei, Peter wrote:
  Since the position argued involves nothing which would invoke
  the malign interest of government powers or corporate legal
  departments, it's not that. I can only think of two reasons why
  our corrospondent may have decided to go undercover...

 I can think of two innocuous reasons, though the real reason is
 probably something else altogether:

 1.  Defending copyright enforcement is extremely unpopular because
 it seemingly puts you on the side of the hollywood cabal, but in
 fact TCPA/Paladium, if it works as described, and if it is not
 integrated with legal enforcement, does not over reach in the
 fashion that most recent intellectual property legislation, and
 most recent policy decisions by the patent office over reach.

a. TCPA/Palladium must be integrated with laws which give to the
Englobulators absolute legal cudgel powers, such as the DMCA.  So far I
have not seen any proposal by the Englobulators to repeal the DMCA and
cognate laws, so if TCPA/Palladium is imposed, the DMCA will be used, just
as HP threatened to use it a couple of days ago.  And, of course, today
there is no imposed TCPA/Palladium, so the situation will be much worse
when there is.

b. Why must TCPA/Palladium be a dongle on the whole computer?  Why not a
separate dongle?  Because, of course, the Englobulators proceed here on
principle.  The principle being that only the Englobulators have a right to
own printing presses/music studios/movie and animation studios.


 2..  Legal departments are full of people who are, among their
 many other grievious faults, technologically illiterate.
 Therefore when an insider is talking about something, they cannot
 tell when he is leaking inside information or not, and tend to
 have kittens, because they have to trust him (being unable to tell
 if he is leaking information covered by NDA), and are
 constitutionally incapable of trusting anyone.

 --digsig

There is a business, not yet come into existence, of providing standard
crypto services to law offices.

oo--JS.




RE: Challenge to David Wagner on TCPA

2002-08-02 Thread AARG! Anonymous

Sampo Syreeni writes:

 On 2002-08-01, AARG!Anonymous uttered to [EMAIL PROTECTED],...:

 It does this by taking hashes of the software before transferring
 control to it, and storing those hashes in its internal secure
 registers.

 So, is there some sort of guarantee that the transfer of control won't be
 stopped by a check against cryptographic signature within the executable
 itself, in the future? That sort of thing would be trivial to enforce via
 licencing terms, after all, and would allow for the introduction of a
 strictly limited set of operating systems to which control would be
 transferred.

TCPA apparently does not have licensing terms per se.  They say,
in their FAQ, http://www.trustedcomputing.org/docs/Website_TCPA%20FAQ_0703021.pdf,
The TCPA spec is currently set up as a 'just publish' IP model.
So there are no licensing terms to enforce, and no guarantees that
people won't do bad things outside the scope of the spec.  Of course,
you realize that the same thing is true with PCs today, right?  There are
few guarantees in this life.

If you think about it, TCPA doesn't actually facilitate the kind of
crypto-signature-checking you are talking about.  You don't need all
this fancy hardware and secure hashes to do that.  Your worrisome
signature checking would be applied on the software which *hasn't
yet been loaded*, right?  All the TCPA hardware will give you is a
secure hash on the software which has already loaded before you ran.
That doesn't help you; in fact your code can pretty well predict the
value of this, given that it is running.  Think about this carefully,
it is a complicated point but you can get it if you take your time.

In short, to implement a system where only signed code can run, TCPA is
not necessary and not particularly helpful.


 I'm having a lot of trouble seeing the benefit in TCPA
 without such extra measures, given that open source software would likely
 evolve which circumvented any protection offered by the more open ended
 architecture you now describe.

I don't follow what you are getting at with the open source.  Realize that
when you boot a different OS, the TCPA attestation features will allow
third parties to detect this.  So your open source OS cannot masquerade
as a different one and fool a third party server into downloading data
to your software.  And likewise, data which was sealed (encrypted)
under a secure OS cannot be unsealed once a different OS boots, because
the sealing/unsealing is all done on-chip, and the chip uses the secure
hash registers to check if the unsealing is allowed.


 Then, when the data is decrypted and unsealed, the hash is compared to
 that which is in the TPM registers now.  This can make it so that data
 which is encrypted when software system X boots can only be decrypted
 when that same software boots.

 Again, such values would be RE'd and reported by any sane open source OS
 to the circuitry, giving access to whatever data there is. If this is
 prevented, one can bootstrap an absolutely secure platform where whatever
 the content provider says is the Law, including a one where every piece of
 runnable OS software actually enforces the kind of control over
 permissible signatures Peter is so worried about. Where's the guarantee
 that this won't happen, one day?

Not sure I follow this here... the sealed data cannot be reported by an
open source OS because the secret keys never leave the chip without being
themselves encrypted.  As for your second proposal, you are suggesting
that you could write an OS which would only run signed applications?
And run it on a TCPA platform?  Sure, I guess you could.  But you wouldn't
need TCPA features to do it.  See the comments above: any OS today could
be modified to only run apps that were signed with some special key.
You shouldn't blame TCPA for this.


 In answer to your question, then, for most purposes, there is no signing
 key that your TPM chip trusts, so the issue is moot.

 At the hardware level, yes.

TCPA is a hardware spec.  Peter was asking about TCPA, and I gave him the
answer.  You can hypothesize all the facist software you want, but you
shouldn't blame these fantasies on TCPA.

 At the software one, it probably won't be,
 even in the presence of the above considerations. After you install your
 next Windows version, you will be tightly locked in with whatever M$
 throws at you in their DLL's,

Doesn't Microsoft already sign their system DLLs in NT?

 and as I pointed out, there's absolutely no
 guarantee Linux et al. might well be shut out by extra features, in the
 future. In the end what we get is an architecture, which may not embody
 Peter's concerns right now, but which is built from the ground up to bring
 them into being, later.

Again, you are being entirely hypothetical here.  Please describe exactly
how either attestation or secure storage would assist in creating a boot
loader that would refuse to run Linux, or whatever other horrible disaster
you envision.