You, the problem TPM2 solves
image/svg+xml
You, the problem TPM2 solves
Old copy protection systems tried to control
what your PC could do, and were always defeated.
Remote attestation by itself permits your PC
to do almost anything you want, but ensures
your PC can't talk to any services requiring attestation
if they don't like what your PC is doing or not doing.
"Remote attestation is coming back.
How much freedom will it take?"
-- Gabriel Sieben
『minority report mall』
『galaxy 虹膜破解』
『voiceprints
harvested』
『加州政府 新生兒 DNA』
『california DNA privacy』
fingerprints
usernames
not passwords
(Biometrics 皆然)
『touchid hack』
『指紋鎖 一輩子無法更改』
『von der leyen fingerprint』
『Porras Darknet fingerprint』
Greg Chao-Kuei Hung
IM dept, CYUT
Software Liberty Association, Taiwan
You, the Problem TPM2 Solves
明文
密文
私鑰
公鑰
private
key
public
key
asymmetric cryptography
symmetric cryptography
Digital Rights Management
others' rights +
big tech's extra powers
enforced/exercised
on your devices
A
B
attacker
Normal Security Model
DRM "Security" Model
content
supplier
consumer
||
attacker
Why DRM can never be secure
You(r computer) will be assimilated.
code
obsfucation
"security" by
obscurity
Not Just DRM
There are other applications that
provide some legitimacy
of centralized control by big techs:
- copyright enforcement
- remote proctoring
- game cheating prevention
"Give up you control over to the big techs
in exchange for some fairness"
"TPM Hierarchy"
Eric Chiang
You are NOT ALLOWED to sahre or even READ,
much less change your own TPM2 private key.
You can only create
signatures using it.
Effectively, TPM2 chip
is the biometrics of your CPU.
It will be a real-name/pseudonym world
for computers on the Internet.
Steve Lamb @ Microsoft
TPM2
firmware
OS
VM
(cloud)
app
a non-trusted train-prison
Where to seal first? next? (with PCR)
==> reverse engineering using
VM or anything else will be impossible
These slides
@ cyut
article
@ gnu
What will the 3 supreme lords
be able to enforce?
- apps must come from Win Store
- apps must respect DRM
- apps must respect telemetry
- competitors are expelled
- or other much less justified
restrictions
fewer system configuration
options will be available
DRM, Trusted Computing,
and Operating System
Architecture -- Reid&Caelli
v.s.
some cloud
service provider
your
computer
Every cloud service provider
will have as much rootkit
power over your computer
as allowed by MS.
Or google. Or apple.
The OS overlords.
What to do?
- migrate from cloud services requiring
remote attestation to those that don't
- avoid cloud services as much as possible
attestation
required
no attestation
required
"Web-Environment-Integrity"
my comments
on github
Unpacking Google's
new "dangerous"
Web-Environment-
Integrity specification
- vivaldi blog
Google’s nightmare
"Web Integrity API" wants
a DRM gatekeeper
for the web - arstechnica
Apple already shipped
attestation on the web,
and we barely noticed
- Tim Perry
Google's WEI and Apple's PAT
1
標題
qr code
borg
G-force
DRM
DRM always fails
obfuscation
more apps
biometrics
asymmetric cryptography
TPM hierarchy
TPM2 is the biometrics of your CPU
PCR
train analogy
Sieben
rootkit
rootkit
MS the supreme lord
avoid cloud
reduced diversity
overall