On Sun, Feb 22, 2009 at 03:21:21AM +0200, Alex Besogonov wrote:
> Robert Millan wrote:
>>> Making sure, that noone can override it, can be awfully difficult, 
>>> especially
>>> under a physical attacker. A hardware that is at least a bit designed to
>>> withstand such an attack can help a lot.
>> I'm not sure why is physical security so awfully difficult for you (can't you
>> use locks, tamper-proof seals, cameras and alarms?), but most people who're 
>> in
>> the bussiness of protecting physical goods manage to sort it out.
> My devices will be installed at clients' locations. It's impossible to  
> guarantee that all devices will be physically secure.
>
> If you live in the USA then one day such device might contain your  
> private data. Would you like it to be stolen?

My private data is safely stored.  The stuff Google reads from my Gmail
account is *not* private data.

If you send your private stuff elsewhere and trust noone can read it because
a small chip that's not even under your control told you so, you're being
naive...

> Reverse engineering the TPM chip is very costly. And I'm not going to  
> try to protect data from NSA or CIA or another three-letter agency.

...but thankfully, not as much as I thought.

-- 
Robert Millan

  The DRM opt-in fallacy: "Your data belongs to us. We will decide when (and
  how) you may access your data; but nobody's threatening your freedom: we
  still allow you to remove your data and not access it at all."


_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
http://lists.gnu.org/mailman/listinfo/grub-devel

Reply via email to