DRM Based on Trusted Computing Chips 484
An anonymous reader writes "We've always know that Trusted Computing is really about DRM, but computer makers always denied it. Now that their Trusted Computing chips are standard on most new PCs, they've decided to come clean. According to Information Week, Lenovo has demonstrated a Thinkpad with built-in Microsoft and Adobe DRM that uses a Trusted Computing chip with a fingerprint sensor. Even worse: 'The system is also aimed at tracking who reads a document and when, because the chip can report back every access attempt. If you access the file, your fingerprint is recorded.'"
Sweet (Score:5, Funny)
Re:I have one... (Score:5, Insightful)
WTF?
Biased article? (Score:3, Insightful)
Re:Biased article? (Score:5, Insightful)
So, while the current incarnation may seem ok, things are only a few steps from being really bad and invasive. Couple this with the DMCA, and half the things we take for granted with computers now could be taken away, and it will be illegal to 'break' things to get those abilities back.
Right but...Change is good (Score:3, Insightful)
But not yet. This is just a "chip on a motherboard." So what if the adobe doc requires all this authentication? It's ultimately passing unencypted over a bus in a machine of otherwise conventional design. No core level encryption, no encrypted root level executable. That means all the "security" in the world is just so much appendage waiting to be hacked off by the first experienced coder to come al
Re:Right but...Change is good (Score:5, Informative)
Change is not always good. Why do I want to pay for equipment that I will not own?
These "TRUSTED" machines are untrust worthly. You will not be able to control what runs on them. Some one else will decide if you can use your own equipment. Just like the lies with HDTV and HMDI. It is about setting up toll booths deep in your own pockets.
Re:Right but...Change is good (Score:3, Interesting)
You run whatever software you want. If the terms someone makes you agree to say "we can isntall whatever the hell we w
Re:Right but...Change is good (Score:5, Interesting)
Second, running it at the OS level instead of the hardware level of the built-in features of the Intel CPU's is going to really slow it down: that will probably hurt performance a lot of open source versions of the Trusted Computing tools, even if they're legally created.
Third, the next logical stage of Trusted Computing is hardware locking: motherboards that won't load unsigned boot loaders, or won't access DVD drives or hard drives without being authenticated with Trusted Computing licenses to be held by OS distributions or DVD drive and software vendors. This can be used to block open source operating systems from even booting, or to prevent Trusted Computing managed DVD drives from being able to read DVD's that have Trusted Computing signed DVD's in them without a Trusted Computing signed media player.
It's very nasty, and it's at the core of why Microsoft and Hollywood are collaborating so well in this project.
Re:Right but...Change is good (Score:3, Insightful)
Re:Right but...Change is good (Score:3, Interesting)
Personally, I can just hope that it's the ream of click-through wizards that configure the TPM, not the TPM coming pre-configured that way. It sounds like it could work for linux, but, alas, the DMCA... sigh.
I'm just keeping my fingers crossed, that someone, somewhere, will find a way to make it work for better purposes.
Re:Right but...Change is good (Score:3, Insightful)
No it doesn't. Owner Override is something that was PROPOSED by the EFF. The Trusted Computing Group has refused to permit any Owner Override into the system.
If there were an Owner Override then the owner would have the power to control his system and to control and modify the securioty settings at will and he's have the power to unlock his own files at will. In short the owner would have the ability to beat DRM systems. He'd be able to use his Owner Overr
Re:Right but...Change is good (Score:3, Insightful)
The performance hit should be very slight with this integrated DRM. That's fundamental to the whole design of Trusted Computing: if consumers see a real performance hit, they will avoid the DRM controlled media or software.
There are serious trade-offs in having integrated encryption vs. ease of recovering documents. Trusted Computing has decided on, and implemented, a system where all keys are either centrally mana
Re:Right but...Change is good -- bullshit (Score:2)
Move some file from A to B
A -> Server : I give up on accessing encrypted file x, but I copy the encrypted data to B
Server -> A : noted, I will no longer send you the decryption key when you ask for it
Server -> B : you have data from A ?
B -> Server : Yes, can I have the transformation ? here is my machine ID
Server -> B : I am not gi
bullshit indeed (Score:3, Informative)
So you think knowledge of elementary algebra and the very basics of encryption enables you to design secure systems. Your are wrong, it does not. Your childish scheme opens up more questions than it answers: How do A and B know that they are communicating with the correct server, how does the server know it is communicating with the true A and B? If all they have to do to get a decryption key is ask the server, how does t
Re:Right but...Change is good (Score:5, Interesting)
You mean that we can create more artificail scarcity, that will create more artificial markets where people trade more virtual goods. All that while adding near to zero worth on the real markets out there.
We really need to get out of those pyramids. Not create more.
My suggestion... (Score:4, Interesting)
start sticking with free software and hardware that supports and preferably sponsors free software. change vendors if your vendor goes treacherous-computing direction. import/smuggle hardware is tcpa is mandated by legislation, while writing a letter to your legislator saying that tcpa is a restriction on free trade and outright nazism. because it is.
Re:Biased article? (Score:5, Insightful)
By saying "yet", you imply that you believe people will start screaming about it, at some point. I think you give way too much trust in that the general public is actually educated enough to differentiate between propoganda and the truth. I think they will be fed some load of crap about hackers, and theives and such. Then the media will help by putting a bunch of it in the news in a timely manner, and all the people will be like "wow there's a lot of that going on, I understand" then they'll say my favorite line "...besides, I have nothing to hide, I'm not a theif or a hacker" (which is equivilant to what pastor Martin Niemoller is known for saying). Then they will be forced to pay annual fees and all that nonsense, and continually be told new reasons "why" they have to pay more and more, and the general public will just eat it because, the majority of people are just plain stupid.
First they came for the [hackers] and I did not speak out -- because I was not a [hacker].
Then they came for the [music and movie theives] and I did not speak out -- because I [never stole music or movies].
Then they came for the [software pirates] and I did not speak out -- because I was not a [software pirate].
Then they came for me -- and by then there was no one left to speak out for me.
(Attributed to Pastor Martin Niemöller, German priest during WWII as the Nazis took everyone away to the camps)
Re:Biased article? (Score:5, Insightful)
Bullshit they wouldn't. The software companies realise they have a product that never gets old, never wears out and will perform the task it was purchased to do until hell freezes over unless they find a way of breaking it. Software companies have been trying to find ways of making software wear out for decades so they can rake a continuous income from their customers the way other manufacturers do. They use product activation to tie the non-wearing software to the fragile hardware for example, but their customers hate them for it.
The customer wants to buy a tool and use it forever, or until they no longer have a use for it, whichever comes first. We know damn well when they're being scammed, and want nothing to do with this license once and pay forever crap. We've tolerated buying the same product over and over again because we accepted we were paying for new features and improvements.
The cost of production of each copy of a program is nil, so the only controllable cost variable for a producer of software is the cost of development, the development of those features and improvements we've been paying for. If they can get away with using this DRM garbage to artificially obsolete programs, they won't need to keep improving the software, they'll have their continuous income without the cost of development. Say goodbye to software innovation.
Re:Biased article? (Score:5, Insightful)
Now comes interesting Tidbit Number two...
The article mentions "My fingerprint results in Access Denied, but the person who wrote it gets into the [document]." Right... So what if they want ME to be able to get in, but not my coworker? How do they acquire MY credentials to allow me in? How secure is this acquisition? Already things like PK Encryption require chains of custody and KNOWN Public Keys to have the proper security. When you get into the extremely-high levels of security, it gets somewhat complex. But now there is a certificate associated with my fingerprint?
Overall, while they claim "Makes it easier", from a security standpoint, I actually see a lot of room for complication, error, and massive breaches of security. And as the article points out: Do you REALLY trust Microsoft to not have security holes? One "Oops" and suddenly the document that you need -ME- to be able to read is not at all accessible by me, but who knows who instead.
And what kind of "Oops" does it take? Gee... Spoofed email of a Public Key maybe? Social Engineering of a phone call to claim to be me, and give them a false cert fingerprint? And of course if I use Linux, I'm {censored} out of luck. If Linux will even RUN on the systems anymore, since Microsoft doesn't sign it to be trusted.
Re:Biased article? (Score:2)
Second, Microsoft seems to be keeping the master keys, and you can be quite certain that the US fe
No, no... security management is simple after all. (Score:5, Funny)
Then, tie one to every computer in the building.
Now, make up another finger, with a different design, and label it "Admin". Distribute it only to admins (note that changing fingers will be required as you hire and fire).
Then, for each specific user group, manufacture a set of rubber fingers, and label them accordingly. Now distribute the fingers on a keychain...
Re:Biased article? (Score:3, Insightful)
And it "records" fingerprints. Oh my. Of course, many systems of this type only record data points and are unable to reconstruct the fingerprint from those points. This could be of that type, though I doubt the author would admit it. Even so, please explain to me how recording the fingerprint of someone who's tryi
Re:Biased article? (Score:2)
If the laptop is stolen for its data most of the protection effort is in vain. The thief can rip out the harddrive and read it's contents on another machine. Unless the harddrive or the files are well encrypted. And even in that case, the laptop user could yield to rubber hose cryptanalysis.
If the "trusted" computing chip uses keys to sign/encrypt things, those keys will get leaked/hacked eventually.
Sensitive data does not belong on a laptop.
Re:Biased article? (Score:3, Insightful)
This is how these things get adopted: they are offered to the businesses and parents, but soon same businesses will demand to control their users because of piracy and infair business tactics.
And you know it'll get used for privacy invasion and remote control.
Slowly, carefully, but it's inevitable. Few years from now we won't even know how it happened.
It's not the gun that kills, the man holding it is. Whether the technolog
Re:Biased article? (Score:5, Insightful)
I don't believe that for a second. They are responding to arm-twisting by Microsoft and Adobe (,etc.) and working *against* customer interests. Consumers have no interest in DRM at all. The question on manufactures' minds is how much DRM they can shove down consumers' throats before they balk and stop buying. They are counting on consumers being either too ignorant or too passive or too apathetic -- until it's too late.
Re:Biased article? (Score:3, Insightful)
Limited? Where? Stuff created before I was born will still be protected after I die. That's not limited.
Re:Biased article? (Score:5, Insightful)
Yep, that's what is quickly becoming the worlds most parrotted unsubstantiated claim, with more and more indications, ranging from the rapid ascendance of opensource through the economic rules of free market competition, suggesting that it's blatantly false.
I suggest that competition, communications and the free exchange of ideas drive the advance of science, technology and the arts. I suggest that intellectual monopoly legislation not only does not serve its purpose, it actively slows the advance down through removing competetive pressure and the introduction of barriers for information combination.
Oh no, I can hear them cry (Score:5, Insightful)
What next?
I would sell my soul for total control over you. Or something like that. What has come of the world that corporate greed has taken over from the free harmonious society? I would love to say everyone will just scrap computers and move onto other ventures (like going outside) but that is the Utopian view. In reality the Orwellian scenario us coming upon us. It won't be long now people.
What is sad about this is they are touting the "legitimite" uses of making sure software is unmodified and doesn't contain root kits and protecting sensitive data from attackers. I find it funny that SHA1SUM and gpg --checksig tells me when my download isn't what the author intended. Cryptoloop (and a tonne of other software) keeps my files highly secure and safe from prying eyes even if they do steal my disks.
There are no legitimite uses for this technology that can't already be accomplished today. There are only evil uses!
Re:Oh no, I can hear them cry (Score:4, Insightful)
Open Hardware to go with our Open Source Software?
I imagine the smaller hardware shops like Soekris [soekris.com] will become more popular and be able to ramp up production, become cheaper and more viable. I realise that Soekris make stuff for embedded and router type hardware, but surely there will always be desktop and laptop machines available without built in DRM?
Hmm, maybe some motherboards put out with some powerful FPGA's for the CPU and maybe some other parts for controllers and graphics.
Surely the people can take the power back!
Re:Oh no, I can hear them cry (Score:3, Insightful)
The media industry does NOT need PCs. On the other hand, PC and laptop vendors do need media as its one reason more to buy a computer. If the studios want, there will be no video playback for PC, they can rely on dedicated DVD players. This wouldnt hurt them, but it would hurt IBM/Lenovo, Dell, Acer, and MS since they deliver the most used OS for the computers. So the *AAs can force MS and the IHVs to play along. As a side effect, ANYTHING can be DRM'ed.
Re:Oh no, I can hear them cry (Score:5, Interesting)
Don't act like it's news. Microsoft already changed it's license agreement. Now, for all you folks who like to upgrade your computers, a new motherboard means you need to buy a new copy of windows for a new license. [aviransplace.com] Yep! Windows MAY NOT be transferred between different PC's and changing out the motherboard constitutes a new PC according to Microsoft now. In fact, according to a Technet Community Chat [microsoft.com], replacing a DEFECTIVE Motherboard still requires a new license! As they said: .i have a system i sold, mainboard is to handle a 3.2 processor but originally sold it with 2.4 with promise of upgradeability to 3.2, though main board works fine with 2.4 it does not with 3.2, is this considered a failed mainboard
"Q: k guys, my question is
A: This is still considered an upgrade if the motherboard is changed. You might want to try using the latest BIOS for the motherboard. If it still doesn't support the 3.2 GHz CPU and you replace the motherboard then you'll have to sell them a new OS." - Microsoft Technet Community Chat
Quite a bit of fun, no?
Re:Oh no, I can hear them cry (Score:5, Informative)
Re:Oh no, I can hear them cry (Score:2)
If I have to change motherboards or upgrade overall to a better machine and I want to transfer my retail boxed copy of Windows XP Pro to the new machine, will I be able to do it without having to ring Microsoft and pay to talk to one of their trained monkeys?
Surely Microsoft are playing with more fire here with Apple doing so well and looking to do better with comparably performing machines. Especially if in the future Apple provide
Re:Oh no, I can hear them cry (Score:2)
Good thing they can't retroactively change earlier agreements.
Re:Oh no, I can hear them cry (Score:3, Interesting)
Re:Oh no, I can hear them cry (Score:5, Insightful)
IBM, Dell etc. are not the evil ones here, neither is MS. Its the *AAs who don't care about destroying the universal computer.
Oh god, you are so fucking wrong it actually hurts to read this.
DRM is all about controlling applications -- music and video are just the high-profile stuff. Applications spread/use data, if you are going to control data, you must control applications. TCPA hardware decides which code gets to run, and what it can access... and it does it behind walls of encryption to ensure that *you* can't see what is executing. IBM, Dell etc etc all have massive hard-ons for this hardware because *THEY WILL CONTROL WHAT YOU DO WITH YOUR PC*. They will broker the CPU, memory, hard disc, sound/gfx card on your machine to the RIAA/MPAA members, or just anyone they feel like. You will have no say in the matter. They can install software on your computer without you ever knowing about it, and you will not be able to remove it or disable any undesirable features because your computer will not be "trusted" anymore.
In addition, it will allow them to take GPLed software like the Linux kernel and make it de facto proprietary... simply because the hardware will not "trust" the binary unless it is signed by Dell/Intel/IBM etc etc. So your GPL source is worthless in that world -- you can't modify it... hell, you can't even recompile it yourself without modification, because the result won't work as it did.
Re:Oh no, I can hear them cry (Score:5, Insightful)
And now we see why v3 of the GPL has provisions to prevent this.
Re:Oh no, I can hear them cry (Score:2, Interesting)
Decreasing functionality (Score:3, Interesting)
Consider more than the MSDOS PC (Score:3, Funny)
Re:Consider more than the MSDOS PC (Score:2)
OBjoke (Score:5, Funny)
Does your PC have Trusted Computing? (Score:5, Informative)
*THIS* is what FOSS is all about. (Score:5, Insightful)
Re:*THIS* is what FOSS is all about. (Score:5, Insightful)
You won't even be able to use your OSS tools on a "trusted computing" platform. That's the whole point.
This new scheme is aimed explicitely at locking out any software from vendors that don't lick the RIAA/MPAA's collective bottoms.
Re:*THIS* is what FOSS is all about. (Score:4, Insightful)
Somehow, million of people don't refuse this way and put themselves to authorisation and authentication ("genuine advantage") procedures, product activation and "calling home" on startup.
So you may not, but the business doesn't care about you, you're a minority.
Re:*THIS* is what FOSS is all about. (Score:4, Insightful)
Re:*THIS* is what FOSS is all about. (Score:2)
What about the customer? (Score:4, Interesting)
A while back processor serial numbers were added as a feature but I've yet to see a system where the ability to read the it was enabled. Trusted Computing is potentially 100x more intrusive so I don't think it's going far in cases where the user is the one who decides what system to purchase.
Re:What about the customer? (Score:5, Insightful)
Bingo!
The customers and the consumers are not the same. The customer is the corporation who wants to lock up its data. The consumer is the person to whom the corporation wishes to grant access to that data.
Yes, lots of consumers are also customers of the hardware manufacturers but the corporations are larger customers and their voice is louder. If you dont want this stuff in a computer that you are buying then you need to let those manufacturers know about it. Buy something else and send them a copy of the receipt with a note explaining why you didnt buy their hardware.
Re:What about the customer? (Score:2)
Re:What about the customer? (Score:2)
Second, it does provide a robust and hopefully well integrate
Re:What about the customer? (Score:2)
getting out of computing? (Score:5, Insightful)
Re:getting out of computing? (Score:2)
Re:getting out of computing? (Score:2)
And (Score:3, Informative)
If we don't create alternatives now(and not in 10-25 years), the Trusted Computing Group will p3wn us.
For those keeping score there's only one key peice missing:
a law requiring the use of this DRM, or making illegal [microshaft.org] non DRM stuff, for the trusted computing group to win.
Re:getting out of computing? (Score:5, Interesting)
Fortunately, we don't need firearms for this. We can stop using and recomending DRM capable hardware and we can halt software development for it. We must be very vocal in our opposition to this. We may may be few, but I am sure this audience is more influential than the average.
Re:getting out of computing? (Score:4, Interesting)
have all the techs who feel strongly about this get an MBA become managers, and make non DRM corporate/institutionional policy.
Why do you think PCs and not Apples are the primary system. It wasn't because of the Joe Smoe consumer. The Management back in the 80s compared PC and Apples and found that PCs (called IBMs and IBM compatibles at the time) were less restricting and allowed easier growth because a bunch of companies make different computers that all work the same. So that is why they went with PCs and not apples, or other platforms wether they were technically superior or not, was not a major issue. When businesses use or don't use a technology then people who want to work from home will use similar technology, then their kids will use it. And people who want the technology see other people using it or not using it and make their decision based off of that. Being the techs in the trenches who scream this is Bad stop. will rarely get up to the higher ups because they just figure you are just worried about having to pay for your pirated software, not any bigger picture. So except for saying how stupid management is and DRM is, do something about it Get into upper management and bring your views with you and work from the top down to fix the problems. If you don't want to do that then expect your voice not to be heard.
Nope, because PHBs will say... (Score:2)
And MS will do whatever is necessary to see that the governments use their product, including giving it away free or less than free.
Re:getting out of computing? (Score:2)
If they out law
Pulling the plug (Score:4, Insightful)
--Ryvar
Re:Pulling the plug (Score:2, Insightful)
RMS's Nightmare is Coming (Score:5, Informative)
A significant improvement in usability (Score:3, Insightful)
You no longer have to travel to the document repository, and you are no longer restricted to the hours that the librarian keeps.
Re:A significant improvement in usability (Score:3, Informative)
Re:A significant improvement in usability (Score:3, Interesting)
You've acheived autheniation, and arguably need-to-know, but you've failed mandatory access control, trusted path, labelling and covert channel prevention.
You have nothing like the security of the repository, so you don't get the document.
--dave (former professional paranoid) c-b
What about virtual machines? (Score:4, Interesting)
Re:What about virtual machines? (Score:2)
Re:What about virtual machines? (Score:4, Informative)
Exellent question.
The Trust chip spys on exactly what software you run. It watches and logs every piece of software right from the BIOS to the bootloader to the operating system, and then it logs either certain applications or all applications you have run since bootup.
The Trust chip securely reports on the exact identity of the software. If you attempt to make even the slightest change in the BIOS or Operating System or anywhere else, the Chip logs that difference.
So the answer is that it is impossible for VMWare to work. VMWare cannot emulate the Trust chip because it does not know the unique crypto key locked inside of the Trust chip, and it cannot emulate the Trust chip by using a substitute key because you cannot forge the Trusted Computing Group's cryptographic signature to activate that key. So the VMWare only has two choices:
(1) VMWare BLOCKS the Trust chip - meaning the software does not work.
(2) VMWare BREAKS the emulation mode and passes I/O directly into and out of the Trust chip without filtering, without modification. The trust chip then "knows" and reports that VMWare is running and that the system is virtualized and again the software does not work.
Trusted Computing defeats/kills virtualization software like VMWare. The very point of Trusted Computing is to prohibit virtualization and to deny people control over their own computers.
-
Trusted Computing == Untrustful Customers (Score:3, Insightful)
I'm just disgusted that companies are putting on a smile and trying to gain consumers' "trust," yet none trusts consumers. However when consumers do not trust companies by removing DRM, consumers quickly become criminals, and are called pirates and thieves. While companies abuse the consumers' trust and play market share or monopoly or pricing/licensing games, companies are just looking out for the economy/artists/share holder's best interest.
There is no such thing as "trusted" computing. No one trust anyone here. This shouldn't be called "trusted computing." This should be called "Untrustful Consumers Computing."
Let's call it "Cold War"? (Score:3, Interesting)
It's just Cold War again all over. The fun part is, that neither can exist without the other. The content manufacturers can't exist without their customers, be
Ah! I see a new profitable market! Fake Thumbs! (Score:5, Insightful)
Steve
There is much truth in what you say (Score:5, Informative)
The problem with fingerprints is that it's inherently a very insecure way of authentication for two reasons:
Firstly, you can't change it if it leaks out. A password or a credit card number can be easily changed and the damage minimised in case of an information leak. Doing this with a fingerprint is much harder.
Secondly, the fingerprint is very hard to keep secret. Your body has this annoying ability to leave copies of your identification token all over the place, very easy for anyone to pick up. If you were worried about the ability to scan proximity tags (RFID), then you should be really scared about the use of fingerprints as authentication tokens.
If you don't believe me how easy it is to pick up, read this [schneier.com] about how to make a copy of ones fingerprint using common household items.
FreeBSD (Score:2)
If you play GTA on a DRM'd computer, and find Al Quaida or the Mothers of America send the hit squad after you because of your moral degeneracy (or any other reason), its not my fault.
I truly hate this crap, the companies will pay! (Score:5, Insightful)
I have the right to use my computer to whatever I feel like and it is of no concern to anyone but me. If the companies disagrees with this they can take a hike for all that I care.
All this will contribute to - is to further alienate Linux and users of alternate operating systems and demean our hard efforts to get legal DVD-playback software etc. for our chosen platforms. I am so put down by this Ill probably never run anything with DRM on it again just for the opposition of it. I will not purchase DRM enabled mp3-players, I will NOT purchase DRM harddisks or any hardware with DRM on it.
If I am forced to do it because of the fact that every hardware producer is forced by Microsoft to do so... I will do anything I can in my power to make sure that my system will be rid of such hardware, modding, jacking, compiling - I really dont care. Its my hardware and NO one shall take that right away from me! No one shall control my software or my computers or what I will be doing with them.
I fully and completely agree with the companies about piracy, I dont support piracy in any way. That said - I also support my own freedom to chose, and past experience shows us that businesses will always do whats best for them FIRST before the customers, the customers are just milking-cows to them - which is fair enough if you give us what we pay for. When you decide to mess with our hardware and deprecate our already paid for services and hardware - then I am putting my foot down and say - Enough already!
All this will probably further feed a grassroot "linux-like" organization that will form an alternate OS that will NOT conform to DRM - even if by law (god forbid it goes that far). DRM and control of customers hardware is a CRIME against the public!
Re:I truly hate this crap, the companies will pay! (Score:2)
I have the right to use my computer to whatever I feel like and it is of no concern to anyone but me. - I beg to differ. There are plenty of things that you are not allowed to do with your computer by the law. You are not allowed to crack into other computers (either with intent to steal or for learning something new.) You are not allowed to say, download child-porn, etc. We know that people cannot be trusted. If people could be trusted
Re:I truly hate this crap, the companies will pay! (Score:4, Insightful)
You couldnt be more wrong even if you intended to (no offence). If the products are capable of putting outside powers to control your own purchased product - then that in itself is wrong. We create the law, if we find something sinister to what corporate does to us - we protest, such is the way of democracy.
Take the Recent Sony battle as an example on how good
intentions (for themselves) could go horribly wrong.
There are plenty of things that you are not allowed to do with your computer by the law. You are not allowed to crack into other computers (either with intent to steal or for learning something new.) You are not allowed to say, download child-porn, etc.
I think that kind of goes without saying, I assumed that you - the reader - know how to follow the law. You have knifes to cut your food but you could potentially KILL someone with it, but of course most of us will never do that. So your point falls to the ground with a boom. I do however believe that in order to fight cybercrimes - better investigation software, filters etc. are better tools for protecting each other, and not the very least...better education rather than enforcement.
You think you have some kind of a natural right, to be sold computer hardware without built in DRM? Nope, you do not.
Im starting to believe that Im falling victim to a TROLL here...Of course we all have a NATURAL right to be sold any products without whatever we dont want - we are the customers - we have the money. Duh!
You are going to spend all of your time cracking your hardware and software? It is going to be very time consuming, if at all possible.
*cough* Linux *cough* GPL...hello, where have you been the last 10 years? Under a rock? We have plenty of free alternatives programmed by ourselves and our GPL friends in our spare time. This is all about the freedom of controlling our own hardware / software. No need for cracking of any kind.
Companies are going to pay? No. Companies are going to get paid better now.
How can you be so sure? You are assuming everyone is a pirate. Guess what? There are thousands, if not - millions of alternatives to everything you can buy - largely thanks to the effective communication of the internet. Do I need to buy the latest hit from Madonna? Do I need the collective hits of Michael Jackson? No - At least not me.... I do just fine with thousands of remakes and independent music made by independent artists who have placed their music in the open and free for everyone (LEGALLY mind you) from their own bedroom or garage band, there are more quality alternatives than you might think.
Same goes for software really... I have made a living out of using Blender 3D software, the Gimp and much more to produce high end advertising, packaging art etc. All free - legal - alternatives. No use being blinded by what someone WANTS you to do, there are other ways.
And as for Companies getting better paid after DRM? I dont think so. here is why: Remember the radio days? People used to exchange tunes they listen to on the radio on tapes etc. and finally sales boomed because people wanted the real thing on vinyl (or later
To cut it out in carboard paper why I think Hardware DRM is wrong:
- The ability of any corporate to control your computer are borderline dictatorship. No corporate in a democracy are allowed to breach your privacy - for ANY reason - period!
- No company with money as the no.1 priority have the rights
to decide what you shall read, use, develop, sell, give, share unless its their own product. Initially DRM is made to protect their property which in itself is fair enough - until YOU the CUSTOMER are made to pay for the chip or FORCED to have such a chip installed in YOUR paid for computer, then it all goes wrong!
I don't trust my computer (Score:5, Insightful)
It's nice to know that the content industry now trusts my computer and lets it play its crappy movies. The problem is, I don't trust it anymore. I won't trust it with my data, I won't trust it with my files, I won't trust it with my time.
At least until I find a way to make MY computer MINE again.
Until now, I was a good citizen. I bought my music. I bought my movies. I bought my games. My reward was a rootkit, DVDs that don't play on my equipment and software that crippled my system.
Sorry, but I don't trust your computers. And I will do whatever it takes to make my computers mine again!
Re:I don't trust my computer (Score:2)
So your system can be more secure.
That's not otherwise possible right now, because the software to check it can be changed (if there is a security hole to allow it to be, but there nearly always is one).
But hardware is unchangeable.
At the end of the day, DRM is a technology, and technologies are amoral. It's the possible uses it can
Not quite sure what all the fuss is about? (Score:2)
There will always be cracks, there will always be
Who do you trust? (Score:2)
Spend a week in HR and you'll find out how trustworthy your employees are. The stuff that walks out the door or flies out attached to an e-mail, from office supplies to sales data and product plans is astounding.
A license to fingerprint money (Score:2)
Thank Sarbanes-Oxley for this one.. (Score:2, Insightful)
We can't say that RMS didn't see them coming (Score:2)
Locking software to a person (Score:3, Insightful)
You don't need this to secure documents. There are already nice products like TrueCrypt available that let you encrypt a volume and even create hidden volumes within. If someone steals your PC or laptop, they get nothing but the hardware.
It's not entirely about DRM, though. I'd bet there are still more "features" we haven't been told about. If that system can track who reads a document, it can also be used to figure out who visited a web page or who originated an email. Count on it, that's what this is really about. Taking away the remaining shreds of anonimity that's left on the internet. There will likely be some upside to that. Stolen hardware will be easier to locate, as will trojaned spam bots. You'll be able to access software online with reasonable assurance that no one else can get to your stuff. But, overall, we're all going to get dicked.
And it will keep happening until those companies implement something like this and experience a giant decrease in sales. Like Sony and rootkit follies.
Security? (Score:2)
Empower yourself by not using it (Score:2, Insightful)
Pretty much anything you can do to create a hardware/software version freeze, so that wh
It's perfect (Score:3, Funny)
A chance for congress to prove fiber (Score:2)
I cant wait for the first Trusted Virus! (Score:5, Insightful)
What about me? (Score:3, Insightful)
1) So I create a Word document at work. I use my fingerprint to lock it down so no other can read it (I'll unlock it after the draft stage). My company moves me to another project just before it's finished and I die in a freak car accident the same afternoon.
What now? It's not like you can brute force the password as you can do now with Word documents. Thousands and thousands of pounds were spent on the document. More than all the chips inside the grey box are worth.
So what now? Someone please tell me.
2) I refuse to give my fingerprints over to my employer.
"Look boss, you can have 40 hours of my time a week at 100% effort but you're not having anything more from me. No blood, no sweat and no tears. That includes my fingerprints."
Will my employer sack me?
What about if I want my fingerprints back when I leave the company? Track down every document I've ever written to undo the fingerprint locks? I can imagine a phone call 6 months down the line asking me to pop-in for 5 minutes ($1m an hour for my fingerprint service btw boss).
3) We currently send documents over the internet that are worth hundreds of thousands of pounds to possible future tenderers. We use email. We might use PDF but there will be no security on it.
Are we going to change the way we work? No, no way. We don't even use Track Changes or Version Control on SharePoint.
Someone highup expects people to understand this Trusted Computer lark? It's not going to happen at my company (10,000 employees).
I see no benefit in any of this.
Trusted Computing Rootkit - Cryptoviral Extortion (Score:5, Interesting)
Good for the US Government (Score:3, Insightful)
Maybe for some industries with real sensitive data as well, but of little use to the average person, except to please the *AA's.
Re:I Trust My Computer. (Score:4, Funny)
Re:Amazingly shortsighted (Score:5, Insightful)
Keeping corporate proprietary info secure
Or, keeping an internal memo that reveals the company has broken laws etc. secret. DRM of this kind (and on emails, something else they want to implement) makes it very difficult for whistleblowers to collect evidence and expose a company that should rightly be exposed.
The effects of DRM are certainly chilling. Also, as far as trade secrets go, there are laws designed to protect those. DRM will only ever be (ab)used to hide things that shouldn't be hidden and to strip away fair use rights. The media companies weren't able to do it through the law courts, so they sneak in fair-use crippling measures by the back door.
Re:Amazingly shortsighted (Score:4, Insightful)
If I *did* have a legitimate security need, I wouldn't trust this; it's almost certainly backdoored (because I can imagine certain law enforcement agencies could be quite pissed if it wasn't - imagine some criminal using TPM hardware to encrypt their data such that it's password-protected, can only be accessed on that computer with an untampered OS, and erases itself after three consecutive wrong passwords). And if it is, there's no guarantee that someone won't get access to the backdoor who you don't trust with your data (criminals, one of your competitors,
Other and better ways to protect your stuff exist (Score:5, Insightful)
So would you, if you were a software company, trust Microsoft? Would you, if you were a mainboard manufacturer, trust Intel? Would you, if you were a chip producer, trust Infinion?
There are other ways to protect your intellectual property. Open Source encryption mechanisms, the source code of which you can read, audit and evaluate, and even adjust to your security needs.
Re:Other and better ways to protect your stuff exi (Score:2)
Ultimately this will not work - the only way security implementations become accepted as effective is through open review.
Re:About Security (Score:2)