I didn't want to go down this thread, but i feel compelled to respond to the non-sense and hysteria surrounding TPM. As i said before, they are stuffing your open mind with rubbage.
TPM is not part of Ethernet. Perhaps it's been mistaken for IPMI / BMC ( which btw does have known holes ["so if you trust IPMI..."] ). To those who would not "trust" a TPM in their computer: Trust is not a binary phenomenon. There are degrees of truest. It seems over the years some people have built trust with proprietary and closed hardware components in their computer because your CPU, Video Card GPU, BIOS, Ethernet Controller, IPMI's BMC, etc. are all closed hardware ( unless you are using a Letux 400 ). Open hardware is rather rare, but anyone can build an open hardware TPM because the specification and documentations are Open and avail from the Trusted Computing Group ( http://www.trustedcomputinggroup.org/resources/tpm_main_specification ). Specifically, this link includes documentations of the functions available on the chip so you can make use of these in your own applications(s). So that guy who said, "that the functionality is not open documented" is completely wrong. I agree that until an Open Hardware implantation comes out i would not use it to store, for example, Santa Clause's list of naughty boys. But, i am no more worried about a malicious backdoor in the TPM than in any other component. --- Disclaimer: I dont support this, but if you are genuinely freaking-out about TPM. Check if you have on in you computer already and follow these instructions to disable it: http://www.thinkwiki.org/wiki/Embedded_Security_Subsystem#Using_the_Embedded_Security_Subsystem also note: "it is also useless for DRM and other Treacherous Platform corporate ideas." ---
_______________________________________________ Dng mailing list [email protected] https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng
