|
|
Subscribe / Log in / New account

In other words, DRM from top to bottom ...

In other words, DRM from top to bottom ...

Posted Nov 24, 2009 14:35 UTC (Tue) by Cyberax (✭ supporter ✭, #52523)
In reply to: In other words, DRM from top to bottom ... by ledow
Parent article: Linux Implements Support For Trusted Computing, Safer Online Transactions (The Gov Monitor)

We use TPM to prevent leak of medical records, even if a server with then is physically stolen.

My notebook uses full-disk encryption with keys in TPM, unlocked by my fingerprint (with validation done in hardware). It's also quite nice.


to post comments

In other words, DRM from top to bottom ...

Posted Nov 24, 2009 15:11 UTC (Tue) by tialaramex (subscriber, #21167) [Link] (1 responses)

Those built-in fingerprint verification systems don't have a good security reputation

However, in practice there are few scenarios in which weakness of the fingerprint system matters at all. The most common laptop specific security problem is "I left it on the train / in a pub / etc." and I think full disk encryption gives a reasonable level of peace of mind in that type of scenario regardless of whether the key is protected by a passphrase, a USB dongle or a fingerprint reader.

In other words, DRM from top to bottom ...

Posted Nov 26, 2009 20:39 UTC (Thu) by anton (subscriber, #25547) [Link]

Sure, the fingerprint system may help against a casual attacker. However, given a determined attacker you have delivered the key with the lock, because your laptop undoubtedly is decorated with lots of fingerprints of all your fingers.

In other words, DRM from top to bottom ...

Posted Nov 24, 2009 15:46 UTC (Tue) by brinkmd (guest, #45122) [Link]

This is a very common misunderstanding, and one that really hurts every discussion of TPM. Benefits such as hard-disk encryption can be achieved without problems even if all keys in the system are known to the user (at least in principle). Nobody is against that as far as I know. In this scenario, the TPM is nothing but a glorified smart card with some tamper-resistant storage and a crypto OS.

The point of contention has been the remote attestion feature, which relies on a secret key in the TPM chip that is not known (and must not be known) to the owner of the hardware, but only to the manufacturer. This remote attestion feature in principle allows third parties to verify the content of the system, and implementation of other supsicious features. It is not needed for local disk encryption.

This is why the GPLv3 allows TPM features in software, but only if all keys are provided to the user. This effectively disables all features based on remote attestion (DRM etc), but does allow local disk encryption etc.


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds