On Tue, Dec 18, 2012 at 1:32 AM, Anders Rundgren
<anders.rundg...@telia.com> wrote:
> I have only one problem with TPM or TPM-like technology: the desire to
> kill rooting will hamper development.
Agreed (I hope it does not hamper development and mod'ing).

The SIM is a mini-HSM, and can probably be used as the basis for a
trusted platform. So development should be available with the right
architecture and a new SIM card :)

I'm not sure what is easiest for CDMA (SIMs cover GSM networks). We
are seeing SIM like features for CDMA phones, but I suspect its more a
software abstraction coupled with a more versatile baseband processor.

> IMO, it should be technically possible to root devices but data encrypted
> by the original OS should be useless due to a changed encryption key.
> The same should be valid for keys enrolled through the original OS.
Under some Android phones I have, you can unlock the boot loader and
it will wipe the device. For example, my EVO 4G.

The same Android phones do *not* wipe data if the phone is re-SIM'd, though.

> This is probably only feasible if the "TPM" is a part of the main CPU
> which I also think is what is going to happen.
I would expect to see it moved to the baseband processor, and not a
general purpose CPU. What is Qualcomm doing in this area? Is anyone up
to date?

> The TPM enables organizations to *optionally* reject connecting devices
> not running "legitimate" OSes.  That's OK; they already do that to some
> extent.
>
> Related: Microsoft's TPM-based VSD (Virtual Smart Card) scheme:
> http://www.microsoft.com/en-us/download/details.aspx?id=29076
Ah, thanks.

Jeff

> On 2012-12-18 05:10, Jeffrey Walton wrote:
>> http://www.networkworld.com/news/2012/121712-nist-tia-265172.html
>>
>> A mobile security technology proposal drafted by the National
>> Institute of Standards and Technology (NIST) is being soundly rejected
>> by one of the main trade groups representing a broad cross-section of
>> industry.
>>
>> NIST's "Guidelines on Hardware-Rooted Security in Mobile Devices,"
>> issued in draft form in October and out for public comment until last
>> Friday, has drawn sharp criticism from the Telecommunications Industry
>> Association, which labeled NIST's proposal as "over-prescriptive"
>> because it "suggests that security in mobile devices can only be
>> realized using a specific architectural implementation of secure or
>> trustworthy environment, namely the Trusted Platform Module (TPM)
>> architecture specified by the Trusted Computing Group (TCG).
>>
>> TPM is "one way to implement security in mobile devices but it's isn't
>> the only way," said Brian Scarpelli, senior manager of government
>> affairs at Arlington, Va.-based TIA, adding that software-based
>> security can also be relied on. He indicated the TIA membership of
>> carriers and software vendors would prefer not to have to adhere to a
>> specific implementation to meet new federal guidelines for mobile
>> devices, and TIA is reaching out to NIST to voice its objections. TIA
>> industry membership includes carriers such as Verizon Communications
>> and Sprint Nextel, as well as Apple, Dell and Vare.
>>
>> The TPM specification from the TCG is a hardware-based
>> cryptographic-processing technology that can be used for several
>> security purposes, primarily device integrity. TPM is used in desktops
>> and servers but not mobile devices at present. The National Security
>> Agency, for example, which influences technology decisions made at the
>> U.S. Department of Defense, has been an enthusiastic proponent of TPM.
>>
>> TPM exists in much internal computer hardware today, though it appears
>> to suffer from lack of widespread deployment in part due to lack of
>> applications making it easy to deploy.
>>
>> NIST argues for TPM by saying that "many mobile devices are not
>> capable of providing strong security assurances to end users and
>> organizations. Current mobile devices lack the hardware-based roots of
>> trust that are increasingly built into laptops and other types of
>> hosts."
>>
>> NIST says it wants to "accelerate industry efforts" to use
>> hardware-rooted trust technologies, and specifically TPM, in mobile
>> devices such as smartphones and tablets that the federal government
>> would acquire. NIST criticizes today's mobile devices, saying they are
>> "vulnerable to 'jailbreaking' and 'rooting,' which provide device
>> owners with greater flexibility and control over the devices, but also
>> bypass important security features which may introduce
>> vulnerabilities."
>>
>> NIST asserts in its guidelines proposal that TPM and hardware-based
>> root of trust is the model the federal government would like to see
>> for use in assuring device integrity and verification, and that this
>> would also help the government in adopting a bring-your-own-device
>> approach where government employees could use their personally owned
>> devices for work as well.
>> ...

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To post to this group, send email to android-security-discuss@googlegroups.com.
To unsubscribe from this group, send email to 
android-security-discuss+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/android-security-discuss?hl=en.

Reply via email to