On Mon, 8 May 2006, Ross Werner wrote:
It seems really unlikely to me that an attacker who is able to get (a) the encrypted files and (b) the passphrase will be unable to (c) get past whatever hardware requirement I have in place.

CEO Alice or Grandma Carol are probably going to end up compromising (c) the same way they compromise the security of (a) and (b). And people who *aren't* going to compromise the security of (c) are probably going to do well with (a) and (b) too.

I just don't see "trusted" computing as being a win for desktop applications.

Well, that's why I'm asking for a precise scenario. I could see a USB drive getting lost or stolen, and somebody brute forcing the passphrase. If the key can only be recovered by a certian set of TPM modules, then that could *maybe* be nice, but I'm not sure yet how that would work or whether it would be any easier than doing something similar without a TPM module.

                                                        -J

/*
PLUG: http://plug.org, #utah on irc.freenode.net
Unsubscribe: http://plug.org/mailman/options/plug
Don't fear the penguin.
*/

Reply via email to