From Chris.Troutner@PACCAR.com Fri Jul 6 02:37:38 2018 From: Chris Troutner To: cypherpunks-legacy@lists.cpunks.org Subject: [Freedombox-discuss] Trusted Computing Modules Date: Fri, 06 Jul 2018 02:37:38 +0000 Message-ID: <172289270762.3881296.8845622658561399868.generated@mail.pglaf.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============1295632244897017186==" --===============1295632244897017186== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit I did some work for a company a few years ago writing a Linux driver for their TPM chip. From a software perspective, the TPMs rock. However, the TPMs were put into consumer PCs in a very sneaky, stealthy way and their primary focus was for DRM management. So I (personally) think this might be reason why it never took off in open-source circles. However, the TPM isn't as awesome as the industry consortium would lead you to believe. It's pretty trival to solder a hardware sniffer onto the data bus of the chip in order to reverse engineer access to the chip. If you aren't worried about someone (the government) *physically* taking control of your hardware, then the chip is pretty great. This was the conclusion I reached after several months of studying the chip, however, that was several years ago and my memory may be foggy. Chris Troutner http://thesolarpowerexpert.com _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss(a)lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE --===============1295632244897017186==--