On Thu, 15 Aug 2002, Lucky Green wrote:
Hopefully some of those people will not limit themselves to hypothetical
attacks against The Spec, but will actually test those supposed attacks
on shipping TPMs. Which are readily available in high-end IBM laptops.
But doesn't the owner of the box
AARG! Wrote:
It seems that there is (a rather brilliant) way to bypass
TCPA (as spec-ed.) I learned about it from two separate
sources, looks like two independent slightly different hacks
based on the same protocol flaw.
Undoubtedly, more people will figure this out.
Hopefully some
On Thu, 15 Aug 2002, Lucky Green wrote:
Hopefully some of those people will not limit themselves to hypothetical
attacks against The Spec, but will actually test those supposed attacks
on shipping TPMs. Which are readily available in high-end IBM laptops.
But doesn't the owner of the box
It seems that there is (a rather brilliant) way to bypass TCPA (as spec-ed.) I learned
about it from two separate sources, looks like two independent slightly different
hacks based on the same protocol flaw.
Undoubtedly, more people will figure this out.
It seems wise to suppress the urge and
Well, it's probably safer to publish the hack anonymously
and see if it withstands counter-hacking. Could be Microsoft
is baiting and waiting for just such attacks. The giant might
even leak and spread a few itself in order to shoot them down,
to boost its eye-mote credibility.
Send the hack to
AARG! Wrote:
It seems that there is (a rather brilliant) way to bypass
TCPA (as spec-ed.) I learned about it from two separate
sources, looks like two independent slightly different hacks
based on the same protocol flaw.
Undoubtedly, more people will figure this out.
Hopefully some
It seems that there is (a rather brilliant) way to bypass TCPA (as spec-ed.) I learned
about it from two separate sources, looks like two independent slightly different
hacks based on the same protocol flaw.
Undoubtedly, more people will figure this out.
It seems wise to suppress the urge and