I have only one problem with TPM or TPM-like technology: the desire to kill rooting will hamper development.
IMO, it should be technically possible to root devices but data encrypted by the original OS should be useless due to a changed encryption key. The same should be valid for keys enrolled through the original OS. This is probably only feasible if the "TPM" is a part of the main CPU which I also think is what is going to happen. The TPM enables organizations to *optionally* reject connecting devices not running "legitimate" OSes. That's OK; they already do that to some extent. Related: Microsoft's TPM-based VSD (Virtual Smart Card) scheme: http://www.microsoft.com/en-us/download/details.aspx?id=29076 Anders On 2012-12-18 05:10, Jeffrey Walton wrote: > http://www.networkworld.com/news/2012/121712-nist-tia-265172.html > > A mobile security technology proposal drafted by the National > Institute of Standards and Technology (NIST) is being soundly rejected > by one of the main trade groups representing a broad cross-section of > industry. > > NIST's "Guidelines on Hardware-Rooted Security in Mobile Devices," > issued in draft form in October and out for public comment until last > Friday, has drawn sharp criticism from the Telecommunications Industry > Association, which labeled NIST's proposal as "over-prescriptive" > because it "suggests that security in mobile devices can only be > realized using a specific architectural implementation of secure or > trustworthy environment, namely the Trusted Platform Module (TPM) > architecture specified by the Trusted Computing Group (TCG). > > TPM is "one way to implement security in mobile devices but it's isn't > the only way," said Brian Scarpelli, senior manager of government > affairs at Arlington, Va.-based TIA, adding that software-based > security can also be relied on. He indicated the TIA membership of > carriers and software vendors would prefer not to have to adhere to a > specific implementation to meet new federal guidelines for mobile > devices, and TIA is reaching out to NIST to voice its objections. TIA > industry membership includes carriers such as Verizon Communications > and Sprint Nextel, as well as Apple, Dell and Vare. > > The TPM specification from the TCG is a hardware-based > cryptographic-processing technology that can be used for several > security purposes, primarily device integrity. TPM is used in desktops > and servers but not mobile devices at present. The National Security > Agency, for example, which influences technology decisions made at the > U.S. Department of Defense, has been an enthusiastic proponent of TPM. > > TPM exists in much internal computer hardware today, though it appears > to suffer from lack of widespread deployment in part due to lack of > applications making it easy to deploy. > > NIST argues for TPM by saying that "many mobile devices are not > capable of providing strong security assurances to end users and > organizations. Current mobile devices lack the hardware-based roots of > trust that are increasingly built into laptops and other types of > hosts." > > NIST says it wants to "accelerate industry efforts" to use > hardware-rooted trust technologies, and specifically TPM, in mobile > devices such as smartphones and tablets that the federal government > would acquire. NIST criticizes today's mobile devices, saying they are > "vulnerable to 'jailbreaking' and 'rooting,' which provide device > owners with greater flexibility and control over the devices, but also > bypass important security features which may introduce > vulnerabilities." > > NIST asserts in its guidelines proposal that TPM and hardware-based > root of trust is the model the federal government would like to see > for use in assuring device integrity and verification, and that this > would also help the government in adopting a bring-your-own-device > approach where government employees could use their personally owned > devices for work as well. > ... > -- You received this message because you are subscribed to the Google Groups "Android Security Discussions" group. To post to this group, send email to android-security-discuss@googlegroups.com. To unsubscribe from this group, send email to android-security-discuss+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/android-security-discuss?hl=en.