[11269] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Challenge to David Wagner on TCPA

daemon@ATHENA.MIT.EDU (R. Hirschfeld)
Thu Aug 1 19:51:57 2002

Date: Fri, 2 Aug 2002 01:08:47 +0200
From: "R. Hirschfeld" <ray@unipay.nl>
To: jamesd@echeque.com
Cc: cypherpunks@lne.com, cryptography@wasabisystems.com,
	daw@mozart.cs.berkeley.edu
In-reply-to: <3D46FC4C.1146.2D7F8BE@localhost> (jamesd@echeque.com)
Reply-To: ray@unipay.nl

> From: "James A. Donald" <jamesd@echeque.com>
> Date: Tue, 30 Jul 2002 20:51:24 -0700

> On 29 Jul 2002 at 15:35, AARG! Anonymous wrote:
> > both Palladium and TCPA deny that they are designed to restrict 
> > what applications you run.  The TPM FAQ at 
> > http://www.trustedcomputing.org/docs/TPM_QA_071802.pdf reads
> > ....
> 
> They deny that intent, but physically they have that capability. 

To make their denial credible, they could give the owner access to the
private key of the TPM/SCP.  But somehow I don't think that jibes with
their agenda.

If I buy a lock I expect that by demonstrating ownership I can get a
replacement key or have a locksmith legally open it.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post