[bitcoin-list] BitMail [combined summary]



Individual post summaries: Click here to read the original discussion on the bitcoin-dev mailing list

Published on: 2013-07-31T15:54:20+00:00


Summary:

The discussion surrounding the Trusted Platform Module (TPM) began when a thread was accidentally posted on the wrong mailing list. The topic under discussion was the negative attention that TPM functionality had received in the past. Some attributed this negativity to the belief that TPM was pushed by a software/hardware monopoly for the purposes of digital rights management (DRM) and locking down systems. However, it was clarified that the published specifications and technologies of TPM were never intended for such uses. In fact, there has never been a TPM mode that would generally lock systems down or be useful for DRM. The approach taken by Xbox 360 would be more suitable for locking systems down for tampering or DRM.TPM is an independent security chip that becomes more useful when integrated with various components on the motherboard, BIOS, CPU, northbridge, and IOMMU. When combined, these components create a TCG-compliant TC environment that can be used for various purposes. Despite speculation that TPM could be utilized for DRM, this feature was never implemented. It was emphasized that cryptography is to DRM what TC is to DRM. The fear, uncertainty, and doubt (FUD) surrounding TPM were deemed unwarranted and undermined its potential as a cryptographic security tool.While TPMs are hardware components that provide permanent storage in the form of non-volatile random-access memory (NVRAM), they are designed to be cost-effective, resulting in slower performance. Most computers, excluding Macs, have included TPMs for quite some time. Although some motherboards may come with a TPM module header, the modules themselves are not pre-installed and may cost around $50-$100. TPM NVRAM is used to avoid wearing down the hard drive and extend its lifespan. However, the limited number of write cycles in TPM storage poses a challenge when securely deleting data. TPM NVRAM offers a solution to this issue, although it comes at a high usability cost. To achieve reliable and permanently erased data, encryption can be utilized on platters or solid-state drives (SSDs).In conclusion, TPMs serve as an essential component of computer security and are widely used across different systems. The misunderstandings surrounding their functionality were clarified, emphasizing that they were not intended for DRM purposes. Despite the low cost and limited write cycles associated with TPMs, they play a significant role in enhancing data security and extending the lifespan of storage devices.


Updated on: 2023-08-01T05:28:27.632592+00:00