In other words, DRM from top to bottom ...
In other words, DRM from top to bottom ...
Posted Nov 24, 2009 14:35 UTC (Tue) by Cyberax (✭ supporter ✭, #52523)In reply to: In other words, DRM from top to bottom ... by ledow
Parent article: Linux Implements Support For Trusted Computing, Safer Online Transactions (The Gov Monitor)
My notebook uses full-disk encryption with keys in TPM, unlocked by my fingerprint (with validation done in hardware). It's also quite nice.
Posted Nov 24, 2009 15:11 UTC (Tue)
by tialaramex (subscriber, #21167)
[Link] (1 responses)
However, in practice there are few scenarios in which weakness of the fingerprint system matters at all. The most common laptop specific security problem is "I left it on the train / in a pub / etc." and I think full disk encryption gives a reasonable level of peace of mind in that type of scenario regardless of whether the key is protected by a passphrase, a USB dongle or a fingerprint reader.
Posted Nov 26, 2009 20:39 UTC (Thu)
by anton (subscriber, #25547)
[Link]
Posted Nov 24, 2009 15:46 UTC (Tue)
by brinkmd (guest, #45122)
[Link]
The point of contention has been the remote attestion feature, which relies on a secret key in the TPM chip that is not known (and must not be known) to the owner of the hardware, but only to the manufacturer. This remote attestion feature in principle allows third parties to verify the content of the system, and implementation of other supsicious features. It is not needed for local disk encryption.
This is why the GPLv3 allows TPM features in software, but only if all keys are provided to the user. This effectively disables all features based on remote attestion (DRM etc), but does allow local disk encryption etc.
In other words, DRM from top to bottom ...
Sure, the fingerprint system may help against a casual attacker.
However, given a determined attacker you have delivered the key with
the lock, because your laptop undoubtedly is decorated with lots of
fingerprints of all your fingers.
In other words, DRM from top to bottom ...
In other words, DRM from top to bottom ...