On Wed, Jul 31, 2013 at 11:08:53AM +0200, Mike Hearn wrote:
> "Support" for a TPM is a rather tricky thing.
> 
> By itself the TPM is independent of any CPU. However, it's also not very
> useful (though for Pond's use case, it works).
> 
> The TPM gets much more useful when it's integrated with features on the
> motherboard, BIOS, CPU, northbridge, IOMMU etc. Then you have a full blown
> TCG-compliant TC environment, which is useful for many things. Actually it
> was never very useful for DRM - that was only one theoretical possibility
> that was never implemented and even if it had been, TC is to DRM much as
> cryptography is to DRM. So the FUD was just that: fear, uncertainty and
> doubt which probably crippled a highly useful cryptographic security tool
> for good. One of the more shameful periods of the tech industries history,
> if you ask me.

The reason why TPM functionality was so much hated upon is because
it was pushed by a software/hardware monopoly, not just for DRM but
for locking down the system in general.

Obviously a real open and verifyable TPM (aka hardened secret
compartment with some crypto primitives) could be very useful 
in practice. However, this is not what was pushed back then.

------------------------------------------------------------------------------
Get your SQL database under version control now!
Version control is standard for application code, but databases havent 
caught up. So what steps can you take to put your SQL databases under 
version control? Why should you start doing it? Read more to find out.
http://pubads.g.doubleclick.net/gampad/clk?id=49501711&iu=/4140/ostg.clktrk
_______________________________________________
bitcoin-list mailing list
bitcoin-list@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bitcoin-list

Reply via email to