In other words, DRM from top to bottom ...
In other words, DRM from top to bottom ...
Posted Nov 24, 2009 15:46 UTC (Tue) by brinkmd (guest, #45122)In reply to: In other words, DRM from top to bottom ... by Cyberax
Parent article: Linux Implements Support For Trusted Computing, Safer Online Transactions (The Gov Monitor)
The point of contention has been the remote attestion feature, which relies on a secret key in the TPM chip that is not known (and must not be known) to the owner of the hardware, but only to the manufacturer. This remote attestion feature in principle allows third parties to verify the content of the system, and implementation of other supsicious features. It is not needed for local disk encryption.
This is why the GPLv3 allows TPM features in software, but only if all keys are provided to the user. This effectively disables all features based on remote attestion (DRM etc), but does allow local disk encryption etc.