Jump to content

Talk:Trusted Computing Group/Archives/2013

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia


Questions

There are some questions I don't think this article addresses. Like do TPM machines actually exist, or is this vaporware? How do I know if I'm buying one? Even if the full TPM doesn't exist, do current PCs contains components with TPM support and so on. As an outsider it's hard to tell from this article whether it's discussing something real or not.

in the trusted computing article you will find the naswer to all your questions .Dbiagioli 18:32, 20 July 2007 (UTC)

Requested move

Trusted Platform Module is a proper noun, so this page should be moved to Trusted Platform Module -- Lezek 23:42, 12 October 2005 (UTC)

Edit: See also Trusted Computing Group, where this article is referenced as a proper noun -- Lezek 23:44, 12 October 2005 (UTC)


Add *Support or *Oppose followed by an optional one sentence explanation, then sign your vote with ~~~~

Discussion

There wasn't much text here so I merged it with Trusted Computing Group. Ryan Norton T | @ | C 17:54, 18 October 2005 (UTC)

Isn't AMD's related project called Presidio, to be released in 2006?

This link is broken and should be removed or updated: http://www.againsttcpa.com/ —Preceding unsigned comment added by 190.55.88.19 (talk) 21:43, 17 April 2008 (UTC)

A problem with TPM and the "user has control over the system"

The article claims this:

The owner of a TPM-enabled system has complete control over what software does and doesn't run on their system. This does include the possibility that a system owner would choose to run a version of an operating system that refuses to load unsigned or unlicensed software ... . While there is legitimate concern that OS vendors could use these capabilities to restrict what software would load under their OS (hurting small software companies or open source/shareware/freeware providers, and causing vendor lock-in for some data formats), no OS vendor has yet suggested that this is planned.

The problem? We've seen that in some cases, Windows Vista when configured to be dual boot, with BitLocker, will decide that the environment is no longer trusted, and refuse to boot or unlock the drive.

Does the owner have control over what software runs? Do they have the choice of not running software that locks up if the trust is violated? Is it the case that no OS vender is doing this <bleep>?

Here's the problem: The presence of the TPM facility means that software that you use and trust can decide to use the TPM without telling you, and giving you no ability to recover if you change the environment.

Reading that paragraph in the article, it seems to me to be a "propaganda" paragraph -- it sounds/feels like it was added in by someone trying to present the "pro-company" line in favor of the TPM, and give the implication that the owner still controls the computer, and that TPM does not take anything away from the users. But that claim lacks any justification, and in facts looks to fail in the presence of real world experiences. Keybounce (talk) 01:14, 16 February 2009 (UTC)

It sounds markety to you because you don't seem to understand the technology. First of all, you have to explicitly enable the use of a TPM chip on a system (i.e. practically nobody ships computers with the TPM enabled). Second, even when it is enabled, the TPM itself has absolutely no inbuilt capability to prevent you from using software. That's not part of the design. All a TPM does is store keys in a secure way.
When BitLocker is enabled, Vista's startup sequence considers the use of a boot loader that doesn't work with the TPM to be untrusted, and will refuse to boot. In the case of GRUB, you need to use a TPM-enabled version of it; alternatively you can use the Windows Boot Loader and put your third-party system in its list.
None of these things contradict in any way the paragraph as written in the encyclopedia. Warren -talk- 02:07, 16 February 2009 (UTC)
The fact is that the only reason TPM can/doesn't limit the target OS is because there is not currently a standard or requirement for such a limitation. In fact the boot process could be IP protected using TPM. Thus, it is incorrect to say that it can't be done.--Riluve (talk) 02:39, 1 February 2010 (UTC)


The memberlist...

It really needs to go. List of 200+ don't belong in the middle of general articles but in a separate article. 85.76.29.183 (talk) 14:55, 14 February 2010 (UTC)