All of lore.kernel.org
 help / color / mirror / Atom feed
From: Robert Millan <rmh@aybabtu.com>
To: The development of GRUB 2 <grub-devel@gnu.org>
Subject: Re: A _good_ and valid use for TPM
Date: Fri, 27 Feb 2009 21:28:22 +0100	[thread overview]
Message-ID: <20090227202822.GG31629@thorin> (raw)
In-Reply-To: <200902212110.12184.ml@isaac.cedarswampstudios.org>

On Sat, Feb 21, 2009 at 09:10:11PM -0500, Isaac Dupree wrote:
> 
> (warning, I accidentally wrote a long essay exploring when these TPM-like 
> things are evil)
> 
> Okay, suppose we use this means to make them not-so-evil: "Buyer gets a 
> printed copy of the TPM's private key when they buy a board."  I'll call them 
> "(pseudo)TPMs" when they meet GNU demands.  (They could be built with Free 
> software, openly specified hardware designs, etc... why not throw in a bonus 
> :-))
> 
> Alex Besogonov's use case is still possible.  Which should make us suspicious 
> of whether our moral problem is solved.

I don't think there's anything morally wrong with Alex' use case, although
it's not technically unreplaceable either.

> I think my question is: how essential is it that individual people should 
> (always? usually?) have an easy time taking apart their computers, putting 
> them back together, and changing them, and having them behave as "black boxes" 
> to the outside world.

Note that our concern is software, not hardware.  Your microwave oven is
probably a computer too, and it's not a serious problem that it's locked
down and you can't change its software (that would be really dangerous!).

However, if your free programs, which you run on unlocked hardware, suddenly
stop working because they have to interact with third parties (e.g. a web
server) who now demand you use the "Trusted" version, you lose the ability to
modify them, which is one of your basic freedoms.

> I think that we can understand these issues better when we actually have 
> access to Free software (including BIOS) that implements a crypto stack to 
> lock down a computer, on relatively Free hardware designed with some physical 
> security (which is obviously possible, just as the mini-computers called TPMs 
> are designed with some physical security).  Whole computer becomes analogous 
> to TPM in its ability to hide keys etc. -- except that it can be unlocked.  
> Then the issues go back to ones we've been dealing with for centuries, such as 
> whether you should hide a spare key under the doormat in case something 
> happens to the one you normally carry.  Ugh, alright, at least we're back in 
> the physical.

Another interesting example are crypto cards.  They are designed to hide keys,
but they don't do any more than that.  They serve their purpose of
authenticating you to a third party, but can't spy on your memory, and
can't coerce you into running a certain program.

-- 
Robert Millan

  The DRM opt-in fallacy: "Your data belongs to us. We will decide when (and
  how) you may access your data; but nobody's threatening your freedom: we
  still allow you to remove your data and not access it at all."



  reply	other threads:[~2009-02-27 20:28 UTC|newest]

Thread overview: 74+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2009-02-19 17:43 A _good_ and valid use for TPM Alex Besogonov
2009-02-19 19:30 ` phcoder
2009-02-19 21:00   ` Alex Besogonov
2009-02-20  0:29     ` Jan Alsenz
2009-02-20  1:03       ` Alex Besogonov
2009-02-20  7:47         ` Jan Alsenz
2009-02-22  1:14           ` Alex Besogonov
2009-02-27 19:59             ` Robert Millan
2009-02-21 13:46         ` Robert Millan
2009-02-21 14:20           ` Jan Alsenz
2009-02-21 14:34             ` Robert Millan
2009-02-21 15:00               ` Jan Alsenz
2009-02-21 20:08                 ` Robert Millan
2009-02-22  1:21                   ` Alex Besogonov
2009-02-22  9:44                     ` phcoder
2009-02-22 14:49                       ` Michal Suchanek
2009-02-22 15:33                         ` phcoder
2009-02-23  2:34                           ` step21
2009-02-23 13:35                             ` Michal Suchanek
2009-02-27 20:07                             ` Robert Millan
2009-02-27 20:03                     ` Robert Millan
2009-02-21 16:29           ` Alex Besogonov
2009-02-21 17:03             ` phcoder
2009-02-21 20:23               ` Robert Millan
2009-02-21 20:21             ` Robert Millan
2009-02-22  1:26               ` Alex Besogonov
2009-02-27 20:13                 ` Robert Millan
2009-02-20  7:45       ` Michael Gorven
2009-02-20 11:27         ` phcoder
2009-02-20 12:12           ` Michael Gorven
2009-02-20 17:31             ` Jan Alsenz
2009-02-20 18:35               ` Vesa Jääskeläinen
2009-02-20 19:35                 ` Jan Alsenz
2009-02-21 13:59             ` Robert Millan
2009-02-21 13:51         ` Robert Millan
2009-02-21 15:29           ` Michael Gorven
2009-02-21 20:31             ` Robert Millan
2009-02-21 20:43               ` Michael Gorven
2009-02-21 21:04                 ` Robert Millan
2009-02-21 21:17                   ` Jan Alsenz
2009-02-21 21:27                     ` phcoder
2009-02-21 21:32                     ` Robert Millan
2009-02-21 21:57                       ` Jan Alsenz
2009-02-21 23:19                         ` Robert Millan
2009-02-21 21:04               ` Jan Alsenz
2009-02-21 21:27                 ` Robert Millan
2009-02-22  2:10               ` Isaac Dupree
2009-02-27 20:28                 ` Robert Millan [this message]
2009-02-21 16:48           ` Alex Besogonov
2009-02-21 20:39             ` Robert Millan
2009-02-22  1:02               ` Alex Besogonov
2009-02-27 20:33                 ` Robert Millan
2009-02-21 16:58           ` Alex Besogonov
2009-02-21 17:08             ` phcoder
2009-02-21 20:43             ` Robert Millan
2009-02-21 13:31       ` Robert Millan
  -- strict thread matches above, loose matches on Subject: below --
2009-02-21  2:27 Alex Besogonov
2009-02-18 14:10 Alex Besogonov
2009-02-18 14:52 ` Isaac Dupree
2009-02-18 15:10   ` Alex Besogonov
2009-02-18 22:03     ` Isaac Dupree
2009-02-19  9:46       ` Alex Besogonov
2009-02-18  9:10 Alex Besogonov
2009-02-18 12:16 ` phcoder
     [not found] ` <499C7809.6030203@student.ethz.ch>
2009-02-19 10:21   ` Alex Besogonov
2009-02-19 15:05     ` phcoder
2009-02-19 15:38       ` Colin D Bennett
2009-02-19 16:29         ` phcoder
2009-02-21 13:38         ` Robert Millan
2009-02-21 13:43           ` phcoder
2009-02-21 14:00           ` Jan Alsenz
2009-02-19 15:44       ` Michal Suchanek
2009-02-19 16:02         ` phcoder
2009-02-21 13:22 ` Robert Millan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20090227202822.GG31629@thorin \
    --to=rmh@aybabtu.com \
    --cc=grub-devel@gnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.