dangers of TCPA/palladium

Aram Perez aram at pacbell.net
Mon Aug 5 14:18:36 EDT 2002


bear wrote:

> On Mon, 5 Aug 2002, Adam Back wrote:
> 
> 
>> 3. hardware assisted compartmentalization -- CPU can run privileged
>> software, and RAM can contain information that you can not examine,
>> and can not modify.  (Optionally the software source can be published,
>> but that is not necessary, and if it's not you won't be able to
>> reverse-engineer it as it can be encrypted for the CPU).
> 
> This is unacceptable.  If the vendor is so ashamed of his code
> that he won't let anyone see it, I do not want it running on my
> machine.

Even if a vendor lets "anyone see" their code, how do you know that in fact
you are running the code you saw? Look at the recent trojan horse in
OpenSSH.


Regards,
Aram Perez


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com



More information about the cryptography mailing list