My understanding from talking to Intel in mid '98 is that each
processor has an ID that cannot be changed, and there is a special
opcode to retreive that ID from the chip.  Applications would have be
modified to actually perform the operation, but yes, it is a piece of
software that actuall takes the ID from the chip and sends it out to
others.

What I haven't been able to figure out is how this helps anything.
Let's say that M$IE 5.0 has the functionality to read the ID and send
it along in SSL for e-commerce.  Somehow there is a software hook to
read the ID out of the chip, right?  Well, this is Windows, it's VERY
EASY to replace any piece of software.  So, I replace that software to
return '0xdeadbeef' instead of my real ID.  Then M$IE 5.0 sends
'0xdeadbeef' to the vendor, thereby anonymizing myself.  If I can find
someone else's ID I can easily pose myself as them.

I suggested that instead of an ID they should have a public/private
keypair when the chip can perform the private-key operations and
software can extract the public key.  That would, IMHO, prove a better
use of silicon than a static ID number.

Have a Nice Day,

-derek

Jamie Fifield <[EMAIL PROTECTED]> writes:

> 
> On Wed, 20 Jan 1999, Rob Lemos wrote:
> 
> > http://www.zdnet.com/zdnn/stories/news/0,4586,2189721,00.html
> 
> >From this article:
> 
>       "This kills theft," said one cryptographer at this week's RSA
>       Data Security Conference, who had been briefed by Intel on its
>       plans.  "As soon as you go on the Internet, you will be detected."
> 
> 
> 
> Um, why?  Unless network cards are made to transmit the ID when queried
> without any interference from software, wouldn't one just configure one's
> operating system to either not reply to these queries or to use some other
> ID?
> 
> Anyone know something and want to share with the group? :)
> 
> -- 
> 
> Jamie Fifield <[EMAIL PROTECTED]>
> 
> Black holes are where God divided by zero.
> 
> 
> 

-- 
       Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
       Member, MIT Student Information Processing Board  (SIPB)
       URL: http://web.mit.edu/warlord/      PP-ASEL      N1NWH
       [EMAIL PROTECTED]                        PGP key available

Reply via email to