<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.thinkwiki.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=84.59.69.255</id>
	<title>ThinkWiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.thinkwiki.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=84.59.69.255"/>
	<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/wiki/Special:Contributions/84.59.69.255"/>
	<updated>2026-05-13T06:46:17Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.12</generator>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Embedded_Security_Subsystem&amp;diff=6099</id>
		<title>Embedded Security Subsystem</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Embedded_Security_Subsystem&amp;diff=6099"/>
		<updated>2005-07-03T22:44:21Z</updated>

		<summary type="html">&lt;p&gt;84.59.69.255: Description of a new articel added&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|style=&amp;quot;vertical-align:top;padding-right:20px;width:10px;&amp;quot; | [[Image:ESS.jpg|IBM Embedded Security Subsystem]] __NOTOC__&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: 0; margin-right:10px; border: 1px solid #dfdfdf; padding: 0em 1em 1em 1em; background-color:#F8F8FF; align:right;&amp;quot;&amp;gt;&lt;br /&gt;
=== The Embedded Security Subsystem ===&lt;br /&gt;
The Embedded Security Subsystem is nothing but a chip installed on the Thinkpads mainboard that can take care of certain security related tasks conforming to the TCPA standard. It was first introduced among the T23 models and is now under the name Embedded Security Subsystem 2.0 an integral part of most of the modern Thinkpads. The functions of the chip are bound to three main groups:&lt;br /&gt;
* public key functions&lt;br /&gt;
* trusted boot functions&lt;br /&gt;
* initialization and management functions&lt;br /&gt;
&lt;br /&gt;
The purpose of the whole thing is to keep the users sensitive data out of range from software based attacks (like viruses, internet attacks etc.). One way the chip offers to achieve this is by providing storage for keys along with the neccessary functions to handle them within itself, so that a i.e. a private key never has to leave the chip (can't be seen by any piece of software). Besides this there are more complex topics covered by the functionality of the chip. If you want to find out more about it you can find good documents on the [http://www.research.ibm.com/gsal/tcpa/ IBM Research TCPA resources page].&lt;br /&gt;
&lt;br /&gt;
[[Trusted or Treacherous]]?&lt;br /&gt;
&lt;br /&gt;
TC - Trusted Computing - will be the biggest change of the information landscape since decades. &lt;br /&gt;
Besides positive features like a more secure hardware storage for cryptographic keys, an analysis of the proposed standards shows some problematic properties. &lt;br /&gt;
'''One of the main problems is that the computer owner is seen as an adversary, who no longer should have the full control over their own computers anymore.'''&lt;br /&gt;
As the Thinkpads of the recent generations following Thinkpad T23 are equipped with this disputed technology, you have to be aware of the promise and risks inside your ThinkPad - so please read [[Trusted or Treacherous|this article]] about a important topic.&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Linux Support==&lt;br /&gt;
Two linux drivers are available, a [[tpm|classical one]] and a [[tpmdd|newer one]].&lt;br /&gt;
Coverage of functionality of the first is unknown so far, the second is part of a bigger project aiming to provide a usable security framework.&lt;br /&gt;
&lt;br /&gt;
David Stafford (one of the developers of the tpm code at IBM) on March 10, 2005 sent me the most recent version of the tpm-kml code. With his permission, I quote his email:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;I am attaching our latest driver and library.&lt;br /&gt;
This version is in the process of kernel mailing list review, and&lt;br /&gt;
will hopefully be accepted into the official kernel. It works&lt;br /&gt;
much better across various 2.6 kernels. Note that this builds&lt;br /&gt;
three modules tpm, tpm_atmel, and tpm_nsc. You modprobe the&lt;br /&gt;
tpm_atmel (for all current shipping atmel based systems), or&lt;br /&gt;
tpm_nsc (for the coming national based systems).&lt;br /&gt;
&lt;br /&gt;
Also note that there is a conflict with the snd-intel8x0&lt;br /&gt;
kernel module (they each try to grab the LPC bus). You can&lt;br /&gt;
either: load the tpm modules first (such as in initrd or&lt;br /&gt;
rc.sysinit, before sound), or recompile the snd-intel8x0, turning&lt;br /&gt;
off the MIDI and JOYSTICK support. The latest 2.6.11 version&lt;br /&gt;
of snd-intel8x0 also reportedly fixes things.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Compiling this library was easy. Compiling the driver on my 2.6.8-686 (debian testing) laptop failed. But the library works with the driver I compiled from the tpm-2.0 package IBM made available on its pages (see the links below).&lt;br /&gt;
&lt;br /&gt;
Gijs&lt;br /&gt;
&lt;br /&gt;
The T43 requires a patch posted to the LKML by Kylene Jo Hall: [http://marc.theaimsgroup.com/?l=linux-kernel&amp;amp;m=111884603309146&amp;amp;w=2 LKML posting]. An updated patch for linux 2.6.12 is available [http://shamrock.dyndns.org/~ln/linux/tpm_2.6.12.diff here].&lt;br /&gt;
&lt;br /&gt;
==Related Links==&lt;br /&gt;
*[http://www.pc.ibm.com/us/think/thinkvantagetech/security.html IBMs ThinkVantage&amp;lt;sup&amp;gt;TM&amp;lt;/sup&amp;gt; Technologies Embedded Security Subsystem page]&lt;br /&gt;
*[http://www.pc.ibm.com/presentations/us/thinkvantage/56/index.html?shortcut=ess&amp;amp; IBMs ThinkVantage&amp;lt;sup&amp;gt;TM&amp;lt;/sup&amp;gt; Technologies Flash presentation - Embedded Security Subsystem]&lt;br /&gt;
*[http://www.research.ibm.com/gsal/tcpa/ IBM Research TCPA resources page]&lt;br /&gt;
*[http://www.prosec.rub.de/trusted_grub.html Trusted Grub]&lt;br /&gt;
&lt;br /&gt;
==Models featuring this Technology==&lt;br /&gt;
'''IBM Embedded Security Subsystem'''&lt;br /&gt;
*ThinkPad {{R31}}&lt;br /&gt;
*ThinkPad {{T23}}, {{T30}}&lt;br /&gt;
*ThinkPad {{X23}}, {{X24}}&lt;br /&gt;
'''IBM Embedded Security Subsystem 2.0'''&lt;br /&gt;
*ThinkPad {{R32}}, {{R40}}, {{R50}}, {{R50p}}, {{R51}}, {{R52}}&lt;br /&gt;
*ThinkPad {{T40}}, {{T40p}}, {{T41}}, {{T41p}}, {{T42}}, {{T42p}}, {{T43}}, {{T43p}}&lt;br /&gt;
*ThinkPad {{X30}}, {{X31}}, {{X32}}, {{X40}}, {{X41}}, {{X41T}}&lt;br /&gt;
[[Category:Glossary]]&lt;/div&gt;</summary>
		<author><name>84.59.69.255</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6103</id>
		<title>TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6103"/>
		<updated>2005-07-03T22:38:34Z</updated>

		<summary type="html">&lt;p&gt;84.59.69.255: new article&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Trusted or Treacherous??? ==&lt;br /&gt;
&lt;br /&gt;
You own a ThinkPad build after the year 2000? Or you want to buy a brandnew ThinkPad from Levono (IBM)? Do you want to know, what the Embedded Security Subsystem is doing (or can do) in your ThinkPad? &lt;br /&gt;
&lt;br /&gt;
If you answer one or all of these questions with yes, read on :-) This is about Trusted Computing, TCPA, Palladium, the &amp;quot;Fritz&amp;quot;-Chip, Digital Rights Management and your freedom of choice. At the end of this article you find related hyperlinks to this important topic for computer users.&lt;br /&gt;
&lt;br /&gt;
{{NOTE|The following quote is a very short version of the promises and risks of Trusted Computing as the TCG wants it. &lt;br /&gt;
&lt;br /&gt;
After the quote, I will provide you more information, but reading only the following quote will give you at least a litle impresion...&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Where's the problem?''&lt;br /&gt;
&lt;br /&gt;
''It is clear that trusted computing hardware provides security benefits, if software is prepared to take advantage of it. But trusted computing has been received skeptically and remains controversial. Some of the controversy is based on misconceptions, but much of it is appropriate, since trusted computing systems fundamentally alter trust relationships. Legitimate concerns about trusted computing are not limited to one area, such as consumer privacy or copyright issues.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''We have at least two serious concerns about trusted computing. First, existing designs are fundamentally flawed because they expose the public to new risks of anti-competitive and anti-consumer behavior. Second, manufacturers of particular &amp;quot;trusted&amp;quot; computers and components may secretly implement them incorrectly.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''[...]'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''Conclusion''&lt;br /&gt;
&lt;br /&gt;
''We recognize that hardware enhancements might be one way to improve computer security. But treating computer owners as adversaries is not progress in computer security. &amp;lt;br /&amp;gt;'''The interoperability, competition, owner control, and similar problems inherent in the TCG and NCSCB approach are serious enough that we recommend against adoption of these trusted computing technologies until these problems have been addressed. Fortunately, we believe these problems are not insurmountable''', and we look forward to working with the industry to resolve them.&amp;quot;''&lt;br /&gt;
&lt;br /&gt;
Quote in italic, Emphasis by me in bold, Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation].}}&lt;br /&gt;
&lt;br /&gt;
=== Background: ===&lt;br /&gt;
&lt;br /&gt;
Recently, the number of known security incidents has been dramatically increasing. Thus, security issues in computer industry have been pushed forward. &lt;br /&gt;
&lt;br /&gt;
The Trustworthy Computing Initiative by Microsoft and other members of the Trusted Computing Group (TCG) are working on a paradigm&lt;br /&gt;
shift in information technology, which will be the biggest change of the information landscape since decades.&lt;br /&gt;
&lt;br /&gt;
The new concept is to place an especially &amp;quot;trusted&amp;quot; observer (a.k.a. &amp;quot;Fritz&amp;quot;-Chip, a secure cryptographic coprocessor) into information handling devices, to prevent even the device owner from certain operations. &lt;br /&gt;
&lt;br /&gt;
In this context, &amp;quot;trusted&amp;quot; thus means that the owner of the information can trust the device, and verify that the device's &amp;quot;trustworthiness&amp;quot;, while on the other hand the device owner no longer has full control over her device.&lt;br /&gt;
&lt;br /&gt;
According of a lot of technical analysis most researchers have fundamental critics on the main design considerations. The new infrastructure will offer '''only minor protection against worms and viruses'''. &lt;br /&gt;
On the other hand Trusted Computing offers a lot of features which can be used to protect the personal computer against the users.&lt;br /&gt;
&lt;br /&gt;
Compared to this, positive features like a more secure hardware storage for cryptographic keys seem to be a very small benefit.&lt;br /&gt;
&lt;br /&gt;
Additionally, the market domination of Microsoft, obscurities regarding the needed trust infrastructure and a heap of patents have lead to critical evaluations from cryptographers, privacy organizations and European institutions. &amp;lt;br /&amp;gt;&lt;br /&gt;
Because of this pressure the Trusted Computing Group has modifed its proposal. The recent specification ist &amp;quot;TCG 1.2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== A short history of TCPA, TCG, Palladium and NSCB: ===&lt;br /&gt;
&lt;br /&gt;
* 1999: The Trusted Computing Platform Alliance (TCPA) is founded by Intel, Microsoft, HP, Compaq and IBM. &lt;br /&gt;
* 2002: The TCPA Main Specification Version 1.1b has been published in February 2002. &lt;br /&gt;
* 2003: The Trusted Computing Group (TCG) is founded in April 2003 by AMD, HP, IBM, Intel and Microsoft.&lt;br /&gt;
&lt;br /&gt;
:Compared with the TCPA the TCG is less democratic organized and the high membership fees obstruct the possibilities for small companies and non profit organizations to participate.&lt;br /&gt;
&lt;br /&gt;
* Microsofts own concept for 'Trustworthy Computing', &amp;quot;Palladium&amp;quot;, is expected to cost some hundreds of million cash.&lt;br /&gt;
* In the beginning of 2003 the name was changed to &amp;quot;next-generation secure computing base&amp;quot; (NGSCB).&lt;br /&gt;
* In summer 2004 the NGSCB effort seems to have stopped.&lt;br /&gt;
&lt;br /&gt;
What is all the name changing about? &amp;lt;br /&amp;gt;&lt;br /&gt;
Some say, that the change was a reaction to the negative publicity, because Palladium and TCPA was soon equated with a 'Nineteen Eighty-Four'-Scenario of an 'Orwellian society', the ever-present, all-seeing 'Big Brother' and other privacy issues.&lt;br /&gt;
&lt;br /&gt;
=== TCG Hardware Architecture ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Trusted Platform Module (TPM)&amp;quot; (a.k.a. &amp;quot;Fritz&amp;quot;-Chip) is the central building block of the TCG architecture and the first implementation can be seen as just a hardwired smart card. &lt;br /&gt;
&lt;br /&gt;
There are also discussions to integrate the whole functionality into the main processor, which would increase resistance against tampering attacks (see also Intel &amp;quot;LaGrande&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
The most important services of the TCG specifications are:&lt;br /&gt;
* Hardware storage for cryptographic keys&lt;br /&gt;
* Secure booting&lt;br /&gt;
* (Remote) Platform Attestation (''meaning that somebody can check the state of your personal computer over the internet'')&lt;br /&gt;
* Sealing (''meaning binding data to a specific platform and application'')&lt;br /&gt;
&lt;br /&gt;
Generally: There are good arguments that these features can be used to improve the security of computer systems. &amp;lt;br /&amp;gt;&lt;br /&gt;
But: Some of these features can already be established by todays smart card supported systems! &lt;br /&gt;
&lt;br /&gt;
Drawback 1: &lt;br /&gt;
Remote Attestation is a good feature to remotely detect tampering of the computer, as long as this 'somebody' is the owner of the platform. &amp;lt;br /&amp;gt; &lt;br /&gt;
But: If this Remote Attestation is used by third parties, serious privacy and market domination issues arise.&lt;br /&gt;
&lt;br /&gt;
Drawback 2: &lt;br /&gt;
There are certainly legitimate reasons for Sealing. &amp;lt;br /&amp;gt;&lt;br /&gt;
But: The main use case seems to be consumer-unfriendly new 'business cases' for content dealers which involve locking down content to a single platform, based on connecting content to a specific device without any migration options. '''This means e.g. if the user wants to use his music to a portable player he should be forced to buy another license. It seems to be doubtful, if customers will enjoy this limitations.''' &lt;br /&gt;
&lt;br /&gt;
In any case the possible problems of giving away control of the personal hardware should be evaluated carefully.&lt;br /&gt;
&lt;br /&gt;
There have also been two important critiques regarding the hardware security of the &amp;quot;Trusted Platform Modules (TPM)&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The first one has been the insuficient security certification against hardware attacks. In TCG 1.2 this critique has been addressed by an improvement of the hardware requirements and it has to be seen how strong the resistance against sophisticated attacks at intensively daily usage will be.&lt;br /&gt;
&lt;br /&gt;
The second one addreses the 'black box'-characterisitcs and therefore 'hidden channels' in the TCG-Hardware. Hidden channels smuggle secret information to third parties and it has been a well known fact for many years, that hidden channels are easy to implement in black box hardware.&lt;br /&gt;
&lt;br /&gt;
=== TCG and Digital 'Restrictions' Management ===&lt;br /&gt;
&lt;br /&gt;
As stated above, the philosophy behind Remote Platform Attestation and Sealing seems to be a protection of the computer system or electronic device ''against'' its user and owner. &lt;br /&gt;
&lt;br /&gt;
What will do this to the use of digital media content on electronic devices? The answer of the IT- and the Entertainment-Industry is &amp;quot;Digital Rights Management&amp;quot; or just shortly &amp;quot;DRM&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
''The DRM component takes control over the rest of the user's device which they rightfully own (e.g. MP3-Player'' '''or a ThinkPad)''' ''and restricts how it may act, regardless of the user's wishes (e.g. preventing the user from copying a song). All forms of DRM depend on the device imposing restrictions that cannot be legally disabled or modified by the user. In other words, the user has no choice.''&lt;br /&gt;
&lt;br /&gt;
So a new 'name' for DRM came up: '''Digital Restrictions Management''' instead of Digital Rights Management. &lt;br /&gt;
&lt;br /&gt;
I cannot go too much into the details here, so please have a look at the [http://en.wikipedia.org/wiki/Digital_rights_management#DRM_opponents article in the Wikipedia Encyclopedia], where I took the quote from. The bold emphasised addition is mine.&lt;br /&gt;
&lt;br /&gt;
=== Censorship and Avoiding Whistle Blowers ===&lt;br /&gt;
&lt;br /&gt;
The Siamese twin of Digital Restriction Management is censorship. '''The same techniques which avoid copying music songs can be used to limit the access to all kinds of documents'''. The combination from DRM and observation hardware (TCG is in your mind?) leads to very dangerous implications.&lt;br /&gt;
&lt;br /&gt;
Giving a real world example, the Chinese government could easily block the use of all documents containing the words &amp;quot;Dalai Lama&amp;quot; on 'trusted' computer systems.&lt;br /&gt;
&lt;br /&gt;
Another application is the fight against whistle blowers. E.g. government documents about the deportation of own citizens to countries with a doubtful law system or about supporting illegal wars could made only readable for government computers and combined with a expiration date. This might make it very dificult for the society or following generations to disclose these breaches of humanity.&lt;br /&gt;
&lt;br /&gt;
=== Open Source Software and TCG === &lt;br /&gt;
&lt;br /&gt;
Since Microsoft controls a overwhelming part of the OS market, it seems to be rather dificult to evaluate the TCG proposal separated from the Palladium project.&lt;br /&gt;
&lt;br /&gt;
TCG versus GPL: At least two companies are researching on &amp;quot;TCG-enhanced&amp;quot; versions of GNU/Linux. According most security researchers it seems to be necessary to evaluate programs which have access to the 'trusted part'. &lt;br /&gt;
&lt;br /&gt;
This has huge implication for the development of free software. Following a possibly expensive evaluation there will be a signature for one program version. &lt;br /&gt;
&lt;br /&gt;
Even if the program stays under GPL every change of the code will make the signature invalid. This seems to be a strong violation of the main philosophy of Open Source software.&lt;br /&gt;
&lt;br /&gt;
=== Summary === &lt;br /&gt;
&lt;br /&gt;
There are still a lot of critical questions, even though TCG 1.2 contains many steps into the right direction. &lt;br /&gt;
&lt;br /&gt;
== Related Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html 'Trusted Computing' Frequently Asked Questions] - Anti-TC FAQ by Cambridge University security director and professor [[Ross Anderson]].&lt;br /&gt;
*[http://www.againsttcpa.com/ Against-TCPA]&lt;br /&gt;
*[http://invisiblog.com/1c801df4aee49232/article/0df117d5d9b32aea8bc23194ecc270ec Interesting Uses of Trusted Computing]&lt;br /&gt;
*[http://www.gnu.org/philosophy/can-you-trust.html Can you trust your computer?] essay by the FSF&lt;br /&gt;
*[http://www.protectprivacy.org/topic--lang-en.html The civil rights organisation Protect Privacy]&lt;br /&gt;
&lt;br /&gt;
== Read more at Wikipedia, the free encyclopedia: ==&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_computing Trusted Computing]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_Computing_Platform_Alliance Trusted Computing Group (formerly known as TCPA)]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Fritz-chip Fritz-Chip]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Palladium_operating_system Palladium]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Cryptography Wikipedia-Category: Cryptography]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Copyright_law Wikipedia-Category: Copyright Law]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Digital_rights_management Wikipedia-Category: Digital Rights Management]&lt;/div&gt;</summary>
		<author><name>84.59.69.255</name></author>
		
	</entry>
</feed>