POV-Ray : Newsgroups : povray.off-topic : Public key cryptography : Re: Public key cryptography Server Time
5 Sep 2024 13:10:35 EDT (-0400)
  Re: Public key cryptography  
From: Darren New
Date: 11 Jul 2009 13:14:49
Message: <4a58c889$1@news.povray.org>
Warp wrote:
> Invisible <voi### [at] devnull> wrote:
>> Some people are predicting that in the future, regular computers will 
>> work in this way, to prevent anybody running anything that can 
>> circumvent DRM.
> 
>   Then Microsoft will have a huge party for having at last destroyed Linux
> with its 3% market share.

I'm not sure you understand how TPM works. It doesn't keep you from running 
other OSes. It keeps you from running modified OSes that check their keys.

Basically, each stage of the boot sequence checks that the previous stage 
did what it expected: Once the boot ROM launches Windows, Windows checks 
that Windows checksums the way it thinks it should and checks that the boot 
ROM checksums the way it should.  That doesn't mean the boot ROM won't 
launch Linux.

Now, there *are* systems where the key is burned into the hardware, but TPM 
isn't one of them, as I understand it.

-- 
   Darren New, San Diego CA, USA (PST)
   "We'd like you to back-port all the changes in 2.0
    back to version 1.0."
   "We've done that already. We call it 2.0."


Post a reply to this message

Copyright 2003-2023 Persistence of Vision Raytracer Pty. Ltd.