[11318] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: dangers of TCPA/palladium

daemon@ATHENA.MIT.EDU (Aram Perez)
Mon Aug 5 16:30:29 2002

Date: Mon, 05 Aug 2002 11:18:36 -0700
From: Aram Perez <aram@pacbell.net>
In-reply-to: <Pine.LNX.4.40.0208050822150.16955-100000@newbolt.sonic.net>
To: Cryptography <cryptography@wasabisystems.com>

bear wrote:

> On Mon, 5 Aug 2002, Adam Back wrote:
> 
> 
>> 3. hardware assisted compartmentalization -- CPU can run privileged
>> software, and RAM can contain information that you can not examine,
>> and can not modify.  (Optionally the software source can be published,
>> but that is not necessary, and if it's not you won't be able to
>> reverse-engineer it as it can be encrypted for the CPU).
> 
> This is unacceptable.  If the vendor is so ashamed of his code
> that he won't let anyone see it, I do not want it running on my
> machine.

Even if a vendor lets "anyone see" their code, how do you know that in fact
you are running the code you saw? Look at the recent trojan horse in
OpenSSH.


Regards,
Aram Perez


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post