Re: Challenge to David Wagner on TCPA

2002-08-13 Thread lynn . wheeler
actually it is possible to build chips that generate keys as part of manufactoring power-on/test (while still in the wafer, and the private key never, ever exists outside of the chip) ... and be at effectively the same trust level as any other part of the chip (i.e. hard instruction ROM). using

Re: Challenge to David Wagner on TCPA

2002-08-10 Thread Ben Laurie
Lucky Green wrote: Ray wrote: From: James A. Donald [EMAIL PROTECTED] Date: Tue, 30 Jul 2002 20:51:24 -0700 On 29 Jul 2002 at 15:35, AARG! Anonymous wrote: both Palladium and TCPA deny that they are designed to restrict what applications you run. The TPM FAQ at

RE: Challenge to David Wagner on TCPA

2002-08-10 Thread Russell Nelson
Jim Choate writes: On Mon, 5 Aug 2002, Russell Nelson wrote: AARG!Anonymous writes: So don't read too much into the fact that a bunch of anonymous postings have suddenly started appearing from one particular remailer. For your information, I have sent over 400 anonymous

RE: Challenge to David Wagner on TCPA

2002-08-02 Thread Wall, Kevin
Mr AARG! writes... Eric Murray writes: Yes, the spec says that it can be turned off. At that point you can run anything that doesn't need any of the protected data or other TCPA services. But, why would a software vendor that wants the protection that TCPA provides allow his software

Re: Challenge to David Wagner on TCPA

2002-08-02 Thread rsedc
On Mon, Jul 29, 2002 at 03:35:32PM -0700, AARG! Anonymous wrote: Declan McCullagh writes at http://zdnet.com.com/2100-1107-946890.html: The world is moving toward closed digital rights management systems where you may need approval to run programs, says David Wagner, an assistant

Re: Challenge to David Wagner on TCPA

2002-08-02 Thread tpurdy
On Thu, 1 Aug 2002 16:45:15 -0700, AARG!Anonymous [EMAIL PROTECTED] wrote: ... snipt ... Also, as stated earlier, data can be sealed such that it can only be unsealed when the same environment is booted. This is the part above about encrypting cryptographic keys and making sure the right

RE: Challenge to David Wagner on TCPA

2002-08-02 Thread Trei, Peter
Jon Callas[SMTP:[EMAIL PROTECTED]] On 8/1/02 1:14 PM, Trei, Peter [EMAIL PROTECTED] wrote: So my question is: What is your reason for shielding your identity? You do so at the cost of people assuming the worst about your motives. Is this a tacit way to suggest that the only

RE: Challenge to David Wagner on TCPA

2002-08-02 Thread James A. Donald
-- On 2 Aug 2002 at 10:43, Trei, Peter wrote: Since the position argued involves nothing which would invoke the malign interest of government powers or corporate legal departments, it's not that. I can only think of two reasons why our corrospondent may have decided to go undercover... I

Re: Challenge to David Wagner on TCPA

2002-08-02 Thread David G. Koontz
Jon Callas wrote: On 8/1/02 1:14 PM, Trei, Peter [EMAIL PROTECTED] wrote: So my question is: What is your reason for shielding your identity? You do so at the cost of people assuming the worst about your motives. Is this a tacit way to suggest that the only people who need anonymity or

RE: Challenge to David Wagner on TCPA

2002-08-02 Thread Jay Sulzberger
On Fri, 2 Aug 2002, James A. Donald wrote: -- On 2 Aug 2002 at 10:43, Trei, Peter wrote: Since the position argued involves nothing which would invoke the malign interest of government powers or corporate legal departments, it's not that. I can only think of two reasons why our

RE: Challenge to David Wagner on TCPA

2002-08-02 Thread Trei, Peter
AARG! Anonymous[SMTP:[EMAIL PROTECTED]] writes [...] Now, there is an optional function which does use the manufacturer's key, but it is intended only to be used rarely. That is for when you need to transfer your sealed data from one machine to another (either because you have

RE: Challenge to David Wagner on TCPA

2002-08-02 Thread James A. Donald
-- On 2 Aug 2002 at 14:36, Trei, Peter wrote: OK, It's 2004, I'm an IT Admin, and I've converted my corporation over to TCPA/Palladium machines. My Head of Marketing has his TCPA/Palladium desktop's hard drive jam-packed with corporate confidential documents he's been actively working on

RE: Challenge to David Wagner on TCPA

2002-08-02 Thread AARG!Anonymous
Peter Trei writes: It's rare enough that when a new anononym appears, we know that the poster made a considered decision to be anonymous. The current poster seems to have parachuted in from nowhere, to argue a specific position on a single topic. It's therefore reasonable to infer that

RE: Challenge to David Wagner on TCPA

2002-08-02 Thread AARG!Anonymous
Peter Trei envisions data recovery in a TCPA world: HoM: I want to recover my data. Me: OK: We'll pull the HD, and get the data off it. HoM: Good - mount it as a secondary HD in my new system. Me: That isn't going to work now we have TCPA and Palladium. HoM: Well, what do you have to

Re: Challenge to David Wagner on TCPA

2002-08-01 Thread James A. Donald
-- On 31 Jul 2002 at 23:45, AARG! Anonymous wrote: So TCPA and Palladium could restrict which software you could run. They aren't designed to do so, but the design could be changed and restrictions added. Their design, and the institutions and software to be designed around them, is

Re: Challenge to David Wagner on TCPA

2002-08-01 Thread Eric Murray
On Wed, Jul 31, 2002 at 11:45:35PM -0700, AARG! Anonymous wrote: Peter Trei writes: AARG!, our anonymous Pangloss, is strictly correct - Wagner should have said could rather than would. So TCPA and Palladium could restrict which software you could run. TCPA (when it isn't turned off)

Re: Challenge to David Wagner on TCPA

2002-08-01 Thread R. Hirschfeld
From: James A. Donald [EMAIL PROTECTED] Date: Tue, 30 Jul 2002 20:51:24 -0700 On 29 Jul 2002 at 15:35, AARG! Anonymous wrote: both Palladium and TCPA deny that they are designed to restrict what applications you run. The TPM FAQ at

Re: Challenge to David Wagner on TCPA

2002-08-01 Thread AARG!Anonymous
Eric Murray writes: TCPA (when it isn't turned off) WILL restrict the software that you can run. Software that has an invalid or missing signature won't be able to access sensitive data[1]. Meaning that unapproved software won't work. [1] TCPAmain_20v1_1a.pdf, section 2.2 We need to

Re: Challenge to David Wagner on TCPA

2002-08-01 Thread Jay Sulzberger
On Thu, 1 Aug 2002, AARG!Anonymous wrote: Eric Murray writes: TCPA (when it isn't turned off) WILL restrict the software that you can run. Software that has an invalid or missing signature won't be able to access sensitive data[1]. Meaning that unapproved software won't work.

RE: Challenge to David Wagner on TCPA

2002-08-01 Thread James A. Donald
-- On 2 Aug 2002 at 3:31, Sampo Syreeni wrote: More generally, as long as we have computers which allow data to be addressed as code and vice versa, the ability to control use of data will necessarily entail ability to control use of code. So, either we will get systems where