James A. Donald: >> Well obviously I trust myself, and do not trust >> anyone else all that much, so if I am the user, what >> good is trusted computing? >> >> One use is that I can know that my operating system >> has not changed behind the scenes, perhaps by a >> rootkit, know that not only have I not changed the >> operating system, but no one else has changed the >> operating system.
Alexander Klimov wrote: > The argument that TPM can prevent trojans seems to > imply that the trojans are installed by modification > of raw storage while the OS is offline. No it does not. > Btw, how the TCG allows to regularly change the kernel > for security patches and still keep the same > ``reported hash''? It can report that the hash is a value that has been blessed by signed software - and can report that its list of reputable signing authorities is blessed by Microsoft, and does not include me. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]