Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

TCPA WILL KILL 4CHAN AND THE INTERNET

Name: Blooded 2006-04-25 1:49

TCPA WILL KILL 4CHAN AND THE INTERNET "READ ME"

Windows Vista will do this

The consequences:
Thus you're able to determine the consequences for your own situation, we kept this section very generell. But it should be easy to determine the resulting restrictions that would apply for you.

# The informational self-determination isn't existing anymore, it's not possible to save, copy, create, program, ..., the data like you want. This applies for privates as for companies
# The free access to the IT/Software market is completely prevented for anyone except the big companies, the market as we know it today will get completely destroyed
# Restrictions in the usage of owned hardware would apply
# The liberty of opinion and the free speech on the internet would finally be eliminated
# The own rights while using IT-technologies are history.
# The national self-determination of the der particular countries would be fully in the hands of the USA
# Probably the world would break into two digital parts (Countries that express against TCPA

Lear More at

http://www.againsttcpa.com/index.shtml

Name: Anonymous 2009-11-15 3:45

>>33
You can make free use of your machine, just some proprietary software will refuse to run unless it deems the machine "secure" enough (from its perspective, this has nothing to do with actual security). There are many technical and conceptual flaws which make the actual implementation breakable, and even unfeasible. The actual thing is implemented as an optional crypto chip/board which can be installed, it's nothing more than a simple general purpose CPU, a crypto CPU, an encrypted flash storage, and a "tamper resistant" eeprom which contains the main decryption keys for the flash and the rest. By tamper resistance, it's meant that the eeprom will attempt to erase itself if someone attempts to read/write to it directly(using some hardware probing device like those found in failure analysis labs). In practice, these things are far from foolproof. From the software side, there are many attacks possible as well, and the entire interface is documented and emulatable by an attacker that wishes to present a fake TPM device. The only part which can't be emulated is if the device is a real one(its public keys are registered in some database - but as far as it's known, the manufacturers never did setup servers which answered such queries, and I believe a lot of devices in use these days are not even registered, which makes this unenforceable in practice). Oh, did I mention that the device is completly optional, and the user has to go out of its way to install and activate it? There's even a protocol for key eviction, and so on...

In simple terms, if it were implemented seriously, it could be used for DRM, but the current implementation is not the most suitable for it, maybe future revisions will be. A hardware usb dongle device would provide more security(for DRM) than this in practice. I believe that if everyone would actually start relying on such devices for DRM, it would weaken their entire "security" in general, which may be regarded as a good thing by the crackers. However, these devices never did enter the mainstream, which is maybe a good thing, so there's nothing for you to worry about, even if it wasn't anything special to worry about. The only worrisome possibility would be if govts would make stupid laws which require everyone to use this device, and they would only allow "approved" software/hardware, which means such a device could be used by some politicians as a platform for controlling the PC market, however this doesn't have as much as to do with the actual device, as it has to do with laws.
Did I mention Mac OS X requires one of these to run, and did you hear there's many people running OS X on normal PCs without such devices?

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List