dangers of TCPA/palladium
Aram Perez
aram at pacbell.net
Mon Aug 5 14:18:36 EDT 2002
bear wrote:
> On Mon, 5 Aug 2002, Adam Back wrote:
>
>
>> 3. hardware assisted compartmentalization -- CPU can run privileged
>> software, and RAM can contain information that you can not examine,
>> and can not modify. (Optionally the software source can be published,
>> but that is not necessary, and if it's not you won't be able to
>> reverse-engineer it as it can be encrypted for the CPU).
>
> This is unacceptable. If the vendor is so ashamed of his code
> that he won't let anyone see it, I do not want it running on my
> machine.
Even if a vendor lets "anyone see" their code, how do you know that in fact
you are running the code you saw? Look at the recent trojan horse in
OpenSSH.
Regards,
Aram Perez
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com
More information about the cryptography
mailing list