<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.thinkwiki.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Pitsche</id>
	<title>ThinkWiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.thinkwiki.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Pitsche"/>
	<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/wiki/Special:Contributions/Pitsche"/>
	<updated>2026-05-20T13:52:03Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.12</generator>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6368</id>
		<title>TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6368"/>
		<updated>2005-07-10T11:24:42Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: minor text improvements for more readibility&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|style=&amp;quot;vertical-align:top;padding-right:20px;white-space:nowrap;&amp;quot; | __TOC__&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: 0; margin-right:10px; border: 1px solid #dfdfdf; padding: 0em 1em 1em 1em; background-color:#F8F8FF; align:right;&amp;quot;&amp;gt;The Members of the Trusted Computing Group (TCG), formerly the Trusted Computing Platform Allience (TCPA), are working on a paradigm shift in information technology, which could become the biggest change of the information landscape since decades.&lt;br /&gt;
&lt;br /&gt;
This article tries to gather information about the implications of the TCPA and TCG effords. To many users these implications seem rather treacherous than trustworthy. This article tries to give a short summarized overview over the facts from a rather netral point of view.&lt;br /&gt;
&lt;br /&gt;
We will start with a quote:&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;It is clear that trusted computing hardware provides security benefits, if software is prepared to take advantage of it. But trusted computing has been received skeptically and remains controversial. Some of the controversy is based on misconceptions, but much of it is appropriate, since trusted computing systems fundamentally alter trust relationships. Legitimate concerns about trusted computing are not limited to one area, such as consumer privacy or copyright issues.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''We have at least two serious concerns about trusted computing. First, existing designs are fundamentally flawed because they expose the public to new risks of anti-competitive and anti-consumer behavior. Second, manufacturers of particular &amp;quot;trusted&amp;quot; computers and components may secretly implement them incorrectly.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation]''&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==TC - Trusted Computing==&lt;br /&gt;
Recently, the number of known security incidents has been dramatically increasing. Thus, security issues in computer industry have been pushed forward. So far, digital content on computers couldn't be efficiently protected since every security mechanism accessible by software could always be circumvent by software.&lt;br /&gt;
&lt;br /&gt;
The idea of Trusted Computing is to provide a hardware layer that cares for&lt;br /&gt;
* storage of security related data like keys, certificates and checksums&lt;br /&gt;
* encryption and decryption&lt;br /&gt;
* validation of certificates&lt;br /&gt;
* (Remote) Platform Attestation (''meaning that somebody can check the state of your personal computer over the internet'')&lt;br /&gt;
* Sealing (''meaning binding data to a specific platform and application'')&lt;br /&gt;
&lt;br /&gt;
Since this way the hardware can handle security management without any software being able to access the security data (like a Black Box). Moreover, the whole software layer can be 'monitored' by the hardware through the use of checksums. Hence the TCPA layer can recognise changes to the software layer and block the whole system from starting, this way keeping malicious software from running at all.&lt;br /&gt;
&lt;br /&gt;
==A short history of TCPA, TCG, Palladium and NSCB:==&lt;br /&gt;
* 1999: The Trusted Computing Platform Alliance (TCPA) is founded by Intel, Microsoft, HP, Compaq and IBM. &lt;br /&gt;
* February 2002: The TCPA Main Specification Version 1.1b is being published. &lt;br /&gt;
* Early 2003: The name of Microsofts own TC-Projekt &amp;quot;Palladium&amp;quot; is changed to &amp;quot;next-generation secure computing base&amp;quot; (NGSCB).&lt;br /&gt;
* April 2003: The Trusted Computing Group (TCG) is founded by AMD, HP, IBM, Intel and Microsoft.&lt;br /&gt;
* Summer 2004: Microsoft seems to have stopped their &amp;quot;NGSCB&amp;quot;-effort.&lt;br /&gt;
&lt;br /&gt;
==The TCPA==&lt;br /&gt;
Founded 1999 by Compaq, HP, IBM, Intel and Microsoft, the TCPA counts around 200 members by now, among them Adobe, AMD, Fujitsu-Siemens, Gateway, Motorola, Samsung, Toshiba and many others.&lt;br /&gt;
&lt;br /&gt;
==The TCG==&lt;br /&gt;
As successor of the TCPA, the TCG was founded by AMD, HP, IBM, Intel and Microsoft in April 2004.&lt;br /&gt;
&lt;br /&gt;
==TCG Hardware Architecture==&lt;br /&gt;
The Trusted Platform Module (TPM) (a.k.a. &amp;quot;Fritz&amp;quot;-Chip) is the central element of the TCG architecture. Imagine a hardwired smart card for a abstract picture of this architecture.&lt;br /&gt;
&lt;br /&gt;
The integration of the whole functionality into the CPU is also discussed, which would increase resistance against tampering attacks (see also Intel &amp;quot;LaGrande&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Regarding the hardware security of the &amp;quot;Trusted Platform Modules (TPM)&amp;quot;, there were two important critiques:&lt;br /&gt;
*The first one has been the insuficient security certification against hardware attacks. In TCG 1.2 this critique has been addressed by an improvement of the hardware requirements. It has to be seen how strong the resistance against sophisticated attacks at intensively daily usage will be.&lt;br /&gt;
*The second one addreses the 'black box'-characterisitcs and risk 'hidden channels' in the TCG-Hardware, which can be easily implemented and used to send secret information to third parties.&lt;br /&gt;
&lt;br /&gt;
==TC - Treacherous Computing?==&lt;br /&gt;
Generally, there are good arguments that these features can be used to improve the security of computer systems. Trusted Computing offers a lot of features which can be used to protect the personal computer against malicious software and users.  &lt;br /&gt;
&lt;br /&gt;
But according to a lot of technical analysis, most researchers have fundamental critics on the main design considerations. The new infrastructure will offer '''only minor protection against worms and viruses''', although TCG is telling something completely different. Furthermore, some of these features can already be established by todays smart card supported systems, so where is the need for TCG 1.1?&lt;br /&gt;
&lt;br /&gt;
''We recognize that hardware enhancements might be one way to improve computer security. But treating computer owners as adversaries is not progress in computer security. '''The interoperability, competition, owner control, and similar problems inherent in the TCG and NCSCB approach are serious enough that we recommend against adoption of these trusted computing technologies until these problems have been addressed. Fortunately, we believe these problems are not insurmountable''', and we look forward to working with the industry to resolve them.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation], bold emphasis by [[User:Pitsche|Pitsche]]&lt;br /&gt;
&lt;br /&gt;
There are a lot of drawbacks to this kind of security implementation: &lt;br /&gt;
*The concept prevents even the device owner from certain operations. &lt;br /&gt;
*Remote Attestation is a good feature to remotely detect tampering of the computer, as long as this 'somebody' is the owner of the platform. But if this Remote Attestation is used by third parties, serious privacy and market domination issues arise.&lt;br /&gt;
*There are certainly legitimate reasons for Sealing. But the main use case seems to be consumer-unfriendly new 'business cases' for content dealers which involve locking down content to a single platform, based on connecting content to a specific device without any migration options. &lt;br /&gt;
&lt;br /&gt;
Additionally, the market domination of Microsoft, obscurities regarding the needed trust infrastructure and a heap of patents have lead to critical evaluations from cryptographers, privacy organizations and European institutions. &amp;lt;br /&amp;gt;&lt;br /&gt;
Because of this pressure the Trusted Computing Group has modifed its proposal. The recent specification is &amp;quot;TCG 1.2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== DRM - Digital Rights Management ===&lt;br /&gt;
The philosophy behind Remote Platform Attestation and Sealing seems to be a protection of the computer system like a ThinkPad or electronic device like a MP3-Player ''against'' its user and owner.&lt;br /&gt;
&lt;br /&gt;
What will do this to the use of digital media content on computers or other electronic devices? The answer of the IT- and the Entertainment-Industry is &amp;quot;Digital Rights Management&amp;quot; or just shortly &amp;quot;DRM&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
''The DRM component takes control over the rest of the user's device which they rightfully own (e.g. MP3-Player'' '''or a ThinkPad)''' ''and restricts how it may act, regardless of the user's wishes (e.g. preventing the user from copying a song). All forms of DRM depend on the device imposing restrictions that cannot be legally disabled or modified by the user. In other words, the user has no choice.'' Bold emphasised by [[User:Pitsche]].&lt;br /&gt;
&lt;br /&gt;
So a new 'name' for DRM came up: '''Digital Restrictions Management''' instead of Digital Rights Management.&lt;br /&gt;
&lt;br /&gt;
Read more at [[Wikipedia:Digital rights management]].&lt;br /&gt;
&lt;br /&gt;
=== Censorship and Avoiding Whistle Blowers ===&lt;br /&gt;
The Siamese twin of Digital Restriction Management is censorship. '''The same techniques which avoid copying music songs can be used to limit the access to all kinds of documents'''. The combination of DRM and observation hardware like TCG leads to very dangerous implications.&lt;br /&gt;
&lt;br /&gt;
Giving a real world example, the Chinese government could easily block the use of all documents containing the words &amp;quot;Dalai Lama&amp;quot; on 'trusted' computer systems.&lt;br /&gt;
&lt;br /&gt;
Another application is the fight against whistle blowers. E.g. government documents about the deportation of own citizens to countries with a doubtful law system or about supporting illegal wars could be made readable for government computers only and combined with a expiration date. This might make it very dificult for the society or following generations to disclose these breaches of humanity.&lt;br /&gt;
&lt;br /&gt;
=== Summary === &lt;br /&gt;
There are still a lot of critical questions, even though TCG 1.2 contains many steps into the right direction.&lt;br /&gt;
&lt;br /&gt;
==TCPA/TCG in ThinkPads==&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security Chip ===&lt;br /&gt;
IBM introduced it's TCPA/TCG features with some of the [[:Category:T23|T23]] models. The earlier of them didn't yet have the Embedded Security Subsystem, but a kind of pre 1.0 version called the Embedded Security Chip. This chip had the following capabilities:&lt;br /&gt;
*Data communications authentication and encryption&lt;br /&gt;
*Storage of encrypted passwords&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security System (1.0) ===&lt;br /&gt;
Embedded Security System (in IBM documents there is no use of the additive version-nummer 1.0) is using the heayvily disputed &amp;quot;TCG 1.1&amp;quot;-specification.&lt;br /&gt;
&lt;br /&gt;
The Embedded Security Subsystem has the following features:&lt;br /&gt;
*hardware key storage&lt;br /&gt;
*multi-factor authentication&lt;br /&gt;
*local file encryption&lt;br /&gt;
*enhances VPN security&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security System 2.0 ===&lt;br /&gt;
The recent TCG-specification is &amp;quot;TCG 1.2&amp;quot; and Embedded Security System 2.0 is supposed to use this newer specification.&lt;br /&gt;
&lt;br /&gt;
The Embedded Security Subsystem 2.0 has the following features:&lt;br /&gt;
*hardware key storage&lt;br /&gt;
*multi-factor authentication&lt;br /&gt;
*local file encryption&lt;br /&gt;
*enhances VPN security&lt;br /&gt;
*TCG compliant&lt;br /&gt;
&lt;br /&gt;
=== Thinkpads with and without TCPA/TCG ===&lt;br /&gt;
&lt;br /&gt;
If you want to know, which ThinkPads are equipped with TCPA Technology like IBM Embedded Security Subsystem or IBM Embedded Security Subsystem 2.0 and which of them are TCPA/TCG clean models, please [[Embedded Security Subsystem#Models featuring this Technology|see the complete list of models]] at the article about [[Embedded Security Subsystem]].&lt;br /&gt;
&lt;br /&gt;
== OpenSource Software and TCG == &lt;br /&gt;
TCG has huge implication for the development of free software. Following a possibly expensive evaluation there will be a signature for one program version. Even if the program is licensed under the GPL every change to the code will make the signature invalid. This seems to be a strong violation of the main philosophy of OpenSource software.&lt;br /&gt;
&lt;br /&gt;
Since Microsoft controls an overwhelming part of the OS market, it seems to be rather difficult to evaluate the TCG proposal separated from the Palladium project.&lt;br /&gt;
&lt;br /&gt;
TCG versus GPL: At least two companies are researching on &amp;quot;TCG-enhanced&amp;quot; versions of GNU/Linux. According most security researchers it seems to be necessary to evaluate programs which have access to the 'trusted part'. &lt;br /&gt;
&lt;br /&gt;
== Related Links ==&lt;br /&gt;
*[http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html 'Trusted Computing' Frequently Asked Questions] - Anti-TC FAQ by Cambridge University security director and professor [[Ross Anderson]].&lt;br /&gt;
*[http://www.againsttcpa.com/ Against-TCPA]&lt;br /&gt;
*[http://invisiblog.com/1c801df4aee49232/article/0df117d5d9b32aea8bc23194ecc270ec Interesting Uses of Trusted Computing]&lt;br /&gt;
*[http://www.gnu.org/philosophy/can-you-trust.html Can you trust your computer?] essay by the FSF&lt;br /&gt;
*[http://www.protectprivacy.org/topic--lang-en.html The civil rights organisation Protect Privacy]&lt;br /&gt;
&lt;br /&gt;
== Read more at Wikipedia, the free encyclopedia: ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_computing Trusted Computing]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_Computing_Platform_Alliance Trusted Computing Group (formerly known as TCPA)]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Fritz-chip Fritz-Chip]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Palladium_operating_system Palladium]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Cryptography Wikipedia-Category: Cryptography]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Copyright_law Wikipedia-Category: Copyright Law]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Digital_rights_management Wikipedia-Category: Digital Rights Management]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Notes from the original artical that didn't fit so far&lt;br /&gt;
&lt;br /&gt;
Compared to this, positive features like a more secure hardware storage for cryptographic keys seem to be a very small benefit.&lt;br /&gt;
&lt;br /&gt;
:Compared with the TCPA the TCG is less democratic organized and the high membership fees obstruct the possibilities for small companies and non profit organizations to participate.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Microsofts own concept for 'Trustworthy Computing', &amp;quot;Palladium&amp;quot;, is expected to cost some hundreds of million cash.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is all the name changing about? &amp;lt;br /&amp;gt;&lt;br /&gt;
Some say, that the change was a reaction to the negative publicity, because Palladium and TCPA was soon equated with a 'Nineteen Eighty-Four'-Scenario of an 'Orwellian society', the ever-present, all-seeing 'Big Brother' and other privacy issues.&lt;br /&gt;
&lt;br /&gt;
'''This means e.g. if the user wants to use his music to a portable player he should be forced to buy another license. It seems to be doubtful, if customers will enjoy this limitations.'''&lt;br /&gt;
&lt;br /&gt;
In any case the possible problems of giving away control of the personal hardware should be evaluated carefully.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Category:Glossary]]&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6243</id>
		<title>TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6243"/>
		<updated>2005-07-07T10:03:05Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: as discussed in TALK list of models with and without moved to ESS-article and linked to it here&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|style=&amp;quot;vertical-align:top;padding-right:20px;white-space:nowrap;&amp;quot; | __TOC__&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: 0; margin-right:10px; border: 1px solid #dfdfdf; padding: 0em 1em 1em 1em; background-color:#F8F8FF; align:right;&amp;quot;&amp;gt;The Members of the Trusted Computing Group (TCG), formerly the Trusted Computing Platform Allience (TCPA), are working on a paradigm shift in information technology, which could become the biggest change of the information landscape since decades.&lt;br /&gt;
&lt;br /&gt;
This article tries to gather information about the implications of the TCPA and TCG effords. To many users these implications seem rather treacherous than trustworthy. This article tries to give a short summarized overview over the facts from a rather netral point of view.&lt;br /&gt;
&lt;br /&gt;
We will start with a quote:&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;It is clear that trusted computing hardware provides security benefits, if software is prepared to take advantage of it. But trusted computing has been received skeptically and remains controversial. Some of the controversy is based on misconceptions, but much of it is appropriate, since trusted computing systems fundamentally alter trust relationships. Legitimate concerns about trusted computing are not limited to one area, such as consumer privacy or copyright issues.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''We have at least two serious concerns about trusted computing. First, existing designs are fundamentally flawed because they expose the public to new risks of anti-competitive and anti-consumer behavior. Second, manufacturers of particular &amp;quot;trusted&amp;quot; computers and components may secretly implement them incorrectly.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation]''&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==TC - Trusted Computing==&lt;br /&gt;
Recently, the number of known security incidents has been dramatically increasing. Thus, security issues in computer industry have been pushed forward. So far, digital content on computers couldn't be efficiently protected since every security mechanism accessible by software could always be circumvent by software.&lt;br /&gt;
&lt;br /&gt;
The idea of Trusted Computing is to provide a hardware layer that cares for&lt;br /&gt;
* storage of security related data like keys, certificates and checksums&lt;br /&gt;
* encryption and decryption&lt;br /&gt;
* validation of certificates&lt;br /&gt;
* (Remote) Platform Attestation (''meaning that somebody can check the state of your personal computer over the internet'')&lt;br /&gt;
* Sealing (''meaning binding data to a specific platform and application'')&lt;br /&gt;
&lt;br /&gt;
Since this way the hardware can handle security management without any software being able to access the security data (like a Black Box). Moreover, the whole software layer can be 'monitored' by the hardware through the use of checksums. Hence the TCPA layer can recognise changes to the software layer and block the whole system from starting, this way keeping malicious software from running at all.&lt;br /&gt;
&lt;br /&gt;
==A short history of TCPA, TCG, Palladium and NSCB:==&lt;br /&gt;
* 1999: The Trusted Computing Platform Alliance (TCPA) is founded by Intel, Microsoft, HP, Compaq and IBM. &lt;br /&gt;
* February 2002: The TCPA Main Specification Version 1.1b is being published. &lt;br /&gt;
* Early 2003: In the beginning of 2003 the name of Microsofts own TC-Projekt &amp;quot;Palladium&amp;quot; is changed to &amp;quot;next-generation secure computing base&amp;quot; (NGSCB).&lt;br /&gt;
* April 2003: The Trusted Computing Group (TCG) is founded by AMD, HP, IBM, Intel and Microsoft.&lt;br /&gt;
* Summer 2004: Microsoft seems to have stopped their &amp;quot;NGSCB&amp;quot;-effort.&lt;br /&gt;
&lt;br /&gt;
==The TCPA==&lt;br /&gt;
Founded 1999 by Compaq, HP, IBM, Intel and Microsoft, the TCPA counts around 200 members by now, among them Adobe, AMD, Fujitsu-Siemens, Gateway, Motorola, Samsung, Toshiba and many others.&lt;br /&gt;
&lt;br /&gt;
ToDo...&lt;br /&gt;
&lt;br /&gt;
==The TCG==&lt;br /&gt;
As successor of the TCPA, the TCG was founded by AMD, HP, IBM, Intel and Microsoft in April 2004.&lt;br /&gt;
&lt;br /&gt;
==TCG Hardware Architecture==&lt;br /&gt;
The Trusted Platform Module (TPM) (a.k.a. &amp;quot;Fritz&amp;quot;-Chip) is the central element of the TCG architecture. Imagine a hardwired smart card for a abstract picture of this architecture.&lt;br /&gt;
&lt;br /&gt;
The integration of the whole functionality into the CPU is also discussed, which would increase resistance against tampering attacks (see also Intel &amp;quot;LaGrande&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Regarding the hardware security of the &amp;quot;Trusted Platform Modules (TPM)&amp;quot;, there were two important critiques:&lt;br /&gt;
*The first one has been the insuficient security certification against hardware attacks. In TCG 1.2 this critique has been addressed by an improvement of the hardware requirements. It has to be seen how strong the resistance against sophisticated attacks at intensively daily usage will be.&lt;br /&gt;
*The second one addreses the 'black box'-characterisitcs and risk 'hidden channels' in the TCG-Hardware, which can be easily implemented and used to send secret information to third parties.&lt;br /&gt;
&lt;br /&gt;
==TC - Treacherous Computing?==&lt;br /&gt;
Generally, there are good arguments that these features can be used to improve the security of computer systems. Trusted Computing offers a lot of features which can be used to protect the personal computer against malicious software and users.  &lt;br /&gt;
&lt;br /&gt;
But according to a lot of technical analysis, most researchers have fundamental critics on the main design considerations. The new infrastructure will offer '''only minor protection against worms and viruses''', although TCG is telling something completely different. Furthermore, some of these features can already be established by todays smart card supported systems, so where is the need for TCG 1.1?&lt;br /&gt;
&lt;br /&gt;
''We recognize that hardware enhancements might be one way to improve computer security. But treating computer owners as adversaries is not progress in computer security. '''The interoperability, competition, owner control, and similar problems inherent in the TCG and NCSCB approach are serious enough that we recommend against adoption of these trusted computing technologies until these problems have been addressed. Fortunately, we believe these problems are not insurmountable''', and we look forward to working with the industry to resolve them.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation], bold emphasis by [[User:Pitsche|Pitsche]]&lt;br /&gt;
&lt;br /&gt;
There are a lot of drawbacks to this kind of security implementation: &lt;br /&gt;
*The concept prevents even the device owner from certain operations. &lt;br /&gt;
*Remote Attestation is a good feature to remotely detect tampering of the computer, as long as this 'somebody' is the owner of the platform. But if this Remote Attestation is used by third parties, serious privacy and market domination issues arise.&lt;br /&gt;
*There are certainly legitimate reasons for Sealing. But the main use case seems to be consumer-unfriendly new 'business cases' for content dealers which involve locking down content to a single platform, based on connecting content to a specific device without any migration options. &lt;br /&gt;
&lt;br /&gt;
Additionally, the market domination of Microsoft, obscurities regarding the needed trust infrastructure and a heap of patents have lead to critical evaluations from cryptographers, privacy organizations and European institutions. &amp;lt;br /&amp;gt;&lt;br /&gt;
Because of this pressure the Trusted Computing Group has modifed its proposal. The recent specification is &amp;quot;TCG 1.2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== DRM - Digital Rights Management ===&lt;br /&gt;
The philosophy behind Remote Platform Attestation and Sealing seems to be a protection of the computer system like a ThinkPad or electronic device like a MP3-Player ''against'' its user and owner.&lt;br /&gt;
&lt;br /&gt;
What will do this to the use of digital media content on computers or other electronic devices? The answer of the IT- and the Entertainment-Industry is &amp;quot;Digital Rights Management&amp;quot; or just shortly &amp;quot;DRM&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
''The DRM component takes control over the rest of the user's device which they rightfully own (e.g. MP3-Player'' '''or a ThinkPad)''' ''and restricts how it may act, regardless of the user's wishes (e.g. preventing the user from copying a song). All forms of DRM depend on the device imposing restrictions that cannot be legally disabled or modified by the user. In other words, the user has no choice.'' Bold emphasised by [[User:Pitsche]].&lt;br /&gt;
&lt;br /&gt;
So a new 'name' for DRM came up: '''Digital Restrictions Management''' instead of Digital Rights Management.&lt;br /&gt;
&lt;br /&gt;
Read more at [[Wikipedia:Digital rights management]].&lt;br /&gt;
&lt;br /&gt;
=== Censorship and Avoiding Whistle Blowers ===&lt;br /&gt;
The Siamese twin of Digital Restriction Management is censorship. '''The same techniques which avoid copying music songs can be used to limit the access to all kinds of documents'''. The combination of DRM and observation hardware like TCG leads to very dangerous implications.&lt;br /&gt;
&lt;br /&gt;
Giving a real world example, the Chinese government could easily block the use of all documents containing the words &amp;quot;Dalai Lama&amp;quot; on 'trusted' computer systems.&lt;br /&gt;
&lt;br /&gt;
Another application is the fight against whistle blowers. E.g. government documents about the deportation of own citizens to countries with a doubtful law system or about supporting illegal wars could be made readable for government computers only and combined with a expiration date. This might make it very dificult for the society or following generations to disclose these breaches of humanity.&lt;br /&gt;
&lt;br /&gt;
=== Summary === &lt;br /&gt;
There are still a lot of critical questions, even though TCG 1.2 contains many steps into the right direction.&lt;br /&gt;
&lt;br /&gt;
==TCPA/TCG in ThinkPads==&lt;br /&gt;
=== Embedded Security System (1.0) ===&lt;br /&gt;
&lt;br /&gt;
Embedded Security System (in IBM documents there is no use of the additive version-nummer 1.0) is using the heayvily disputed &amp;quot;TCG 1.1&amp;quot;-specification.&lt;br /&gt;
&lt;br /&gt;
''(Features etc. will soon be added here - your help, support or cooperation is very much appreciated)''&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security System 2.0 ===&lt;br /&gt;
&lt;br /&gt;
The recent TCG-specification is &amp;quot;TCG 1.2&amp;quot; and Embedded Security System 2.0 is supposed to use this newer specification.&lt;br /&gt;
&lt;br /&gt;
''(Features etc. will soon be added here - your help, support or cooperation is very much appreciated)''&lt;br /&gt;
&lt;br /&gt;
=== Thinkpads with and without TCPA/TCG ===&lt;br /&gt;
&lt;br /&gt;
If you want to know, which ThinkPads are equipped with TCPA Technology like IBM Embedded Security Subsystem or IBM Embedded Security Subsystem 2.0 and which of them are TCPA/TCG clean models, please [[Embedded Security Subsystem#Models featuring this Technology|see the complete list of models]] at the article about [[Embedded Security Subsystem]].&lt;br /&gt;
&lt;br /&gt;
== OpenSource Software and TCG == &lt;br /&gt;
TCG has huge implication for the development of free software. Following a possibly expensive evaluation there will be a signature for one program version. Even if the program is licensed under the GPL every change to the code will make the signature invalid. This seems to be a strong violation of the main philosophy of OpenSource software.&lt;br /&gt;
&lt;br /&gt;
Since Microsoft controls an overwhelming part of the OS market, it seems to be rather difficult to evaluate the TCG proposal separated from the Palladium project.&lt;br /&gt;
&lt;br /&gt;
TCG versus GPL: At least two companies are researching on &amp;quot;TCG-enhanced&amp;quot; versions of GNU/Linux. According most security researchers it seems to be necessary to evaluate programs which have access to the 'trusted part'. &lt;br /&gt;
&lt;br /&gt;
== Related Links ==&lt;br /&gt;
*[http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html 'Trusted Computing' Frequently Asked Questions] - Anti-TC FAQ by Cambridge University security director and professor [[Ross Anderson]].&lt;br /&gt;
*[http://www.againsttcpa.com/ Against-TCPA]&lt;br /&gt;
*[http://invisiblog.com/1c801df4aee49232/article/0df117d5d9b32aea8bc23194ecc270ec Interesting Uses of Trusted Computing]&lt;br /&gt;
*[http://www.gnu.org/philosophy/can-you-trust.html Can you trust your computer?] essay by the FSF&lt;br /&gt;
*[http://www.protectprivacy.org/topic--lang-en.html The civil rights organisation Protect Privacy]&lt;br /&gt;
&lt;br /&gt;
== Read more at Wikipedia, the free encyclopedia: ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_computing Trusted Computing]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_Computing_Platform_Alliance Trusted Computing Group (formerly known as TCPA)]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Fritz-chip Fritz-Chip]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Palladium_operating_system Palladium]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Cryptography Wikipedia-Category: Cryptography]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Copyright_law Wikipedia-Category: Copyright Law]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Digital_rights_management Wikipedia-Category: Digital Rights Management]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Notes from the original artical that didn't fit so far&lt;br /&gt;
You own a ThinkPad build after the year 2000? Or you want to buy a brandnew ThinkPad from Levono (IBM)? Do you want to know, what the Embedded Security Subsystem is doing (or can do) in your ThinkPad? &lt;br /&gt;
&lt;br /&gt;
If you answer one or all of these questions with yes, read on :-) This is about Trusted Computing, TCPA, Palladium, the &amp;quot;Fritz&amp;quot;-Chip, Digital Rights Management and your freedom of choice. At the end of this article you find related hyperlinks to this important topic for computer users.&lt;br /&gt;
&lt;br /&gt;
Compared to this, positive features like a more secure hardware storage for cryptographic keys seem to be a very small benefit.&lt;br /&gt;
&lt;br /&gt;
:Compared with the TCPA the TCG is less democratic organized and the high membership fees obstruct the possibilities for small companies and non profit organizations to participate.&lt;br /&gt;
&lt;br /&gt;
* Microsofts own concept for 'Trustworthy Computing', &amp;quot;Palladium&amp;quot;, is expected to cost some hundreds of million cash.&lt;br /&gt;
&lt;br /&gt;
What is all the name changing about? &amp;lt;br /&amp;gt;&lt;br /&gt;
Some say, that the change was a reaction to the negative publicity, because Palladium and TCPA was soon equated with a 'Nineteen Eighty-Four'-Scenario of an 'Orwellian society', the ever-present, all-seeing 'Big Brother' and other privacy issues.&lt;br /&gt;
&lt;br /&gt;
'''This means e.g. if the user wants to use his music to a portable player he should be forced to buy another license. It seems to be doubtful, if customers will enjoy this limitations.'''&lt;br /&gt;
&lt;br /&gt;
In any case the possible problems of giving away control of the personal hardware should be evaluated carefully.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Embedded_Security_Subsystem&amp;diff=6242</id>
		<title>Embedded Security Subsystem</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Embedded_Security_Subsystem&amp;diff=6242"/>
		<updated>2005-07-07T09:58:47Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: as discussed in the Talk of trusted or Treach. inserted the 3rd list and&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|style=&amp;quot;vertical-align:top;padding-right:20px;width:10px;&amp;quot; | [[Image:ESS.jpg|IBM Embedded Security Subsystem]] __NOTOC__&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: 0; margin-right:10px; border: 1px solid #dfdfdf; padding: 0em 1em 1em 1em; background-color:#F8F8FF; align:right;&amp;quot;&amp;gt;&lt;br /&gt;
=== The Embedded Security Subsystem ===&lt;br /&gt;
The Embedded Security Subsystem is nothing but a chip installed on the Thinkpads mainboard that can take care of certain security related tasks conforming to the TCPA standard. It was first introduced among the T23 models and is now under the name Embedded Security Subsystem 2.0 an integral part of most of the modern Thinkpads. The functions of the chip are bound to three main groups:&lt;br /&gt;
* public key functions&lt;br /&gt;
* trusted boot functions&lt;br /&gt;
* initialization and management functions&lt;br /&gt;
&lt;br /&gt;
The purpose of the whole thing is to keep the users sensitive data out of range from software based attacks (like viruses, internet attacks etc.). One way the chip offers to achieve this is by providing storage for keys along with the neccessary functions to handle them within itself, so that a i.e. a private key never has to leave the chip (can't be seen by any piece of software). Besides this there are more complex topics covered by the functionality of the chip. If you want to find out more about it you can find good documents on the [http://www.research.ibm.com/gsal/tcpa/ IBM Research TCPA resources page].&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Trusted or Treacherous?==&lt;br /&gt;
&lt;br /&gt;
TC - Trusted Computing - will be the biggest change of the information landscape since decades. Besides positive features like a more secure hardware storage for cryptographic keys, an analysis of the proposed TCG-standards shows some problematic properties. &amp;lt;br /&amp;gt;&lt;br /&gt;
As Thinkpads of recent generations following the Thinkpad T23 ([[Embedded Security Subsystem#Models featuring this Technology|see the complete list of models]]) are equipped with this disputed TCG-/TCPA-Technology, it can be interesting, which promises of the TCG are fulfilled inside your ThinkPad and which parts of the TCG-specifications still seem to be a privacy issue for every user of digital devices like a MP3-player or a ThinkPad - so please read [[TCPA/TCG - Trusted or Treacherous|this article]] for more details.&lt;br /&gt;
&lt;br /&gt;
==Linux Support==&lt;br /&gt;
Two linux drivers are available, a [[tpm|classical one]] and a [[tpmdd|newer one]].&lt;br /&gt;
Coverage of functionality of the first is unknown so far, the second is part of a bigger project aiming to provide a usable security framework.&lt;br /&gt;
&lt;br /&gt;
David Stafford (one of the developers of the tpm code at IBM) on March 10, 2005 sent me the most recent version of the tpm-kml code. With his permission, I quote his email:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;I am attaching our latest driver and library.&lt;br /&gt;
This version is in the process of kernel mailing list review, and&lt;br /&gt;
will hopefully be accepted into the official kernel. It works&lt;br /&gt;
much better across various 2.6 kernels. Note that this builds&lt;br /&gt;
three modules tpm, tpm_atmel, and tpm_nsc. You modprobe the&lt;br /&gt;
tpm_atmel (for all current shipping atmel based systems), or&lt;br /&gt;
tpm_nsc (for the coming national based systems).&lt;br /&gt;
&lt;br /&gt;
Also note that there is a conflict with the snd-intel8x0&lt;br /&gt;
kernel module (they each try to grab the LPC bus). You can&lt;br /&gt;
either: load the tpm modules first (such as in initrd or&lt;br /&gt;
rc.sysinit, before sound), or recompile the snd-intel8x0, turning&lt;br /&gt;
off the MIDI and JOYSTICK support. The latest 2.6.11 version&lt;br /&gt;
of snd-intel8x0 also reportedly fixes things.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Compiling this library was easy. Compiling the driver on my 2.6.8-686 (debian testing) laptop failed. But the library works with the driver I compiled from the tpm-2.0 package IBM made available on its pages (see the links below).&lt;br /&gt;
&lt;br /&gt;
Gijs&lt;br /&gt;
&lt;br /&gt;
The T43 requires a patch posted to the LKML by Kylene Jo Hall: [http://marc.theaimsgroup.com/?l=linux-kernel&amp;amp;m=111884603309146&amp;amp;w=2 LKML posting]. An updated patch for linux 2.6.12 is available [http://shamrock.dyndns.org/~ln/linux/tpm_2.6.12.diff here].&lt;br /&gt;
&lt;br /&gt;
==Related Links==&lt;br /&gt;
*[http://www.pc.ibm.com/us/think/thinkvantagetech/security.html IBMs ThinkVantage&amp;lt;sup&amp;gt;TM&amp;lt;/sup&amp;gt; Technologies Embedded Security Subsystem page]&lt;br /&gt;
*[http://www.pc.ibm.com/presentations/us/thinkvantage/56/index.html?shortcut=ess&amp;amp; IBMs ThinkVantage&amp;lt;sup&amp;gt;TM&amp;lt;/sup&amp;gt; Technologies Flash presentation - Embedded Security Subsystem]&lt;br /&gt;
*[http://www.research.ibm.com/gsal/tcpa/ IBM Research TCPA resources page]&lt;br /&gt;
*[http://www.prosec.rub.de/trusted_grub.html Trusted Grub]&lt;br /&gt;
&lt;br /&gt;
==Models featuring this Technology==&lt;br /&gt;
'''IBM Embedded Security Subsystem'''&lt;br /&gt;
*ThinkPad {{A30p}}&lt;br /&gt;
*ThinkPad {{R31}}&lt;br /&gt;
*ThinkPad {{T23}}, {{T30}}&lt;br /&gt;
*ThinkPad {{X22}}, {{X23}}, {{X24}}&lt;br /&gt;
'''IBM Embedded Security Subsystem 2.0'''&lt;br /&gt;
*ThinkPad {{R32}}, {{R40}}, {{R50}}, {{R50p}}, {{R51}}, {{R52}}&lt;br /&gt;
*ThinkPad {{T40}}, {{T40p}}, {{T41}}, {{T41p}}, {{T42}}, {{T42p}}, {{T43}}, {{T43p}}&lt;br /&gt;
*ThinkPad {{X30}}, {{X31}}, {{X32}}, {{X40}}, {{X41}}, {{X41T}}&lt;br /&gt;
[[Category:Glossary]]&lt;br /&gt;
&lt;br /&gt;
==TCPA/TCG clean models==&lt;br /&gt;
*all models produced before 2000&lt;br /&gt;
*all i Series models&lt;br /&gt;
*ThinkPad [[:Category:240X|240X]]&lt;br /&gt;
*ThinkPad [[:Category:A20m|A20m]], [[:Category:A20p|A20p]], [[:Category:A21e|A21e]], [[:Category:A21m|A21m]], [[:Category:A21p|A21p]], [[:Category:A22e|A22e]], [[:Category:A22m|A22m]], [[:Category:A22p|A22p]], [[:Category:A30|A30]]&lt;br /&gt;
*ThinkPad [[:Category:T20|T20]], [[:Category:T21|T21]]&lt;br /&gt;
*ThinkPad [[:Category:X20|X20]], [[:Category:X21|X21]], [[:Category:X22|X22]]&lt;br /&gt;
*ThinkPad [[:Category:TransNote|TransNote]]&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6208</id>
		<title>Talk:TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6208"/>
		<updated>2005-07-06T19:27:37Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: minor typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Discussion about the article &amp;quot;Trusted or Treacherous&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
Please add you comments here. &lt;br /&gt;
&lt;br /&gt;
You can use the &amp;quot;Plus&amp;quot;(+)-Button next to the &amp;quot;edit&amp;quot;-button at the top of this page to add you comments at the right spot ;-)&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 11:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Plagiarism? ==&lt;br /&gt;
&lt;br /&gt;
Large parts of this article apparently consist of unattributed, near-verbatim excerpts from a SANE2004 paper by Weis, Lucks, and Bogk, [http://www.cryptolabs.org/CCC2004TCunendlich/WeisLucksBogkSane2004tcg12.pdf TCG 1.2 - fair play with the 'Fritz' chip?]. Regardless of whether one believes that general political/ethical concerns about Trusted Computing belong on a Thinkpad-specific site, wholesale copying of unidentified, and presumably copyrighted, material is not cool, and could get the whole project in trouble.&lt;br /&gt;
&lt;br /&gt;
I would suggest that the non-original parts of this article be removed and replaced by an external link to the above-mentioned paper; any particularly crucial short excerpts (as permitted by &amp;quot;fair use&amp;quot;) should be clearly identified as such. The specific information about how the TCG specifications are implemented on various Thinkpad models can stay, of course.&lt;br /&gt;
&lt;br /&gt;
== The Source is under Creative Commons, isn't it? ==&lt;br /&gt;
&lt;br /&gt;
Hello Andrzej,&lt;br /&gt;
&lt;br /&gt;
yes, you are right, another version of this text on a website of the presentation of the annual chaos computer club is one of my sources, but I think, that one is under creative commons license by-nc-sa 2.0 de. And are the presentations of the chaos computer congress not also free unless the speakers don't want it??????&lt;br /&gt;
&lt;br /&gt;
This license allows to copy, distribute, display, perform or modify the text as long as it is published under exactly the same creative commons license and licensees may not use the work for commercial purposes - unless they get the licensor's permission.&lt;br /&gt;
&lt;br /&gt;
My problem was, I had a lot more sources in a different language than english and my first drafts were way to long!&lt;br /&gt;
&lt;br /&gt;
It didn't worked to keep it that short but detailed, as Ruediger and Adreas wrote it.&lt;br /&gt;
&lt;br /&gt;
But if you think, after my explanation the actual version is still problematic, I will delete it of course!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:12, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
If the original authors have explicitly published the text under a suitably permissive CC license, there should be no legal problem in using it in a ThinkWiki article. Even in that case, however, the source needs to be clearly identified, and there should be a link to the complete original article.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Okay Andrzej, I will work on that and tell all of you about it in the coming days, if I have enough time for it.&lt;br /&gt;
&lt;br /&gt;
Unless that, feel free to take out the critical passages of the article or modify it, if you have the time and if you want to do it.&lt;br /&gt;
&lt;br /&gt;
But there is a problem: I slightly changed the text, put two sentence together to one etc. How can I now cite the source?&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
No problem; just say that your ThinkWiki article is ''based on'' the Weis et al. paper, and give a reference. The parts of their text that you include don't have to be verbatim copies; indeed, the whole point is that you are creating a ''derived work'' (e.g., by bringing in material from other sources), which they supposedly explicitly allow in the CC license. To be on the safe side, you should probably also include a link to a web page documenting that the original text is indeed freely licensed, or say that you have personally obtained permission from the authors.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;br /&gt;
----&lt;br /&gt;
Agreed. There should be a general statement in the article about the source the article is derived from, or rather sources - i seem to have used different sources of information for some of my edits. ;-) I'll add mine on next edit.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
== Thanks for your work, i like it ==&lt;br /&gt;
&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
thank you very much for editing and restructering of that article.&lt;br /&gt;
&lt;br /&gt;
I think, I know know what you and Andrzej want and I will try in he next days, to change the article in that way, okay?&lt;br /&gt;
&lt;br /&gt;
P.S.: I don't know, why I loose my logged-in status from time to time, perhaps my connection. I am sorry, that there are IP-Adresses instead of my unsername &amp;quot;pitsche&amp;quot;, I hope, no one gets confused, which edit is by me and which one by someone else :-o&lt;br /&gt;
&lt;br /&gt;
Sorry.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:15, 4 Jul 2005 (CEST)&lt;br /&gt;
----&lt;br /&gt;
About your login status: ThinkWiki doesn't cache logins. This means everytime your connection breaks or your browser closes you will have to login again. But don't worry, we can figure out what's from you and if not - it's a Wiki. ;-) I'm doing a lot of edits without being logged in as well.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
----&lt;br /&gt;
== No exact TCG specifications needed ==&lt;br /&gt;
&lt;br /&gt;
Hello again!&lt;br /&gt;
&lt;br /&gt;
I am against writing about the specific specifications, because it will make the article longer and everybody, who is '''really''' interested in the specifications has several possibilities to get it for free in the WWW or from Cryptolabs.org or from the CCC.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:22, 4 Jul 2005 (CEST)&lt;br /&gt;
----&lt;br /&gt;
I think the TCG specifications should appear there somewhere. At least at current state of my knowledge about the subject i'd think that having them there is helpful for the user to understand what ESS 1 and 2 are capable of. Of course we shouldn't post the whole specs, but some really compressed summary, similar to the 'feature-list' in &amp;quot;TC - Trusted Computing&amp;quot;. Pitsche, if you could point me to them i could do it. Also, a link to the original TCPA specs would be good. The links themselves should be added to the Links section.&lt;br /&gt;
&lt;br /&gt;
That's it so far...i like the way we work on this.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
----&lt;br /&gt;
One more thing...&lt;br /&gt;
&lt;br /&gt;
I think the TCPA implementation in current ThinkPads is pretty harmless. At least at it's current software state. You just don't use it (respectively don't install the supporting software layer) and it never gets active. One interesting aspect of finding out what the chip is capable of is if it could be forced to be used by later software upgrades or not.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Wyrfel! &lt;br /&gt;
&lt;br /&gt;
I also like the way we work on this article. I think, their will be a improvement in the end, that makes everybody happy and is interesting for the users of the ThinkWiki. &lt;br /&gt;
&lt;br /&gt;
Now to your comments:&lt;br /&gt;
&lt;br /&gt;
# I deleted the 'exact' TCG-Specifications, because there is a paragraph about ESS 1.0 and ESS 2.0, where I think the informations should be placed about how much TCG is in ESS, &amp;quot;what ESS 1 and 2 are capable of&amp;quot;  and &amp;quot;if it could be forced to be used by later software upgrades or not&amp;quot; (qutoes from you). Correct me if I am wrong, but otherwiese it would be included two times in the article. Or am I making a mistake here?&lt;br /&gt;
# I agree with you: At least one hyperlink to the TCG-Specifications should be included in the &amp;quot;Related Links&amp;quot; (right now it is No. 9 in the Table Of Contents). Perhaps on wednesday or thursday I will do this...&lt;br /&gt;
# I don't know, if the TCPA implementation in current ThinkPads is pretty harmless. I understood Ruediger and Andreas in their presentation at the 21. Chaos Communication Congress very different to that, because the were referring almost only to IBM and Microsoft.  &amp;lt;br /&amp;gt;&lt;br /&gt;
:It might be a rhetorical technique to fascinate their audience and to keep them awake and following. But my impression of them both was, that they are very concerned scientist (or at least CCC-Activists), who really see the current TCG-Implementations that problematic. And I also felt that they don't need to panic the people just for getting more attention and that they would'nt be disappointed, if they could turn their attention to something else and did'nt have to fight against TCPA/TCG/Palladium :-)&lt;br /&gt;
&lt;br /&gt;
P.S.: Effeff, well, how do I say this, hmmm, does anybody know, where I can find a list of 'common market prices' in USD or Euro for used ThinkPads? &lt;br /&gt;
&lt;br /&gt;
Perhaps something like this [http://www.macnews.de/index.php?_mcnpage=6760 www.macnews.de/index.php?_mcnpage=6760] ???? &amp;quot;Jehova, Jehova, Jeh- outch!&amp;quot; ;-)&lt;br /&gt;
&lt;br /&gt;
Background: I was offered a not so much used ThinkPad A30 with a SXGA+ - TFT-Display without any pixelerrors, but some problems at the drive slot at the right side. Specs of it are: CPU 1.0 Ghz, RAM 512 MB, HDD original IBM 60 GB with 5400 rpm and CD-RW/DVD-ROM-Combo drive...&lt;br /&gt;
&lt;br /&gt;
I have much difficulty for naming a price, because I am not familiar with the cost of repairing that drive slot. At eBay I found some A30p around 600,- Euro and a A22p for 529,- Euro -- is the A30 between? :-o &lt;br /&gt;
&lt;br /&gt;
Thanks!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 01:37, 5 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== a bit paranoid? ==&lt;br /&gt;
&lt;br /&gt;
1) The [[Embedded Security Subsystem]] page already contains a list of ThinkPad's that &amp;lt;u&amp;gt;might&amp;lt;/u&amp;gt; have the security chip, no need to start listing older machines that predate it.&lt;br /&gt;
&lt;br /&gt;
2) And noticed how I said &amp;lt;u&amp;gt;might&amp;lt;/u&amp;gt;, because some of the ThinkPads listed had the security chip as a feature that was not available on every model in the range. You can see this on the individual ThinkPad product pages, as it will say that it was available &amp;lt;i&amp;gt;on select models&amp;lt;/i&amp;gt;. So for example it is perfectly possible to get a second-hand R40, T40 or X31 without the chip. If you want to know the exact type-model of machines with or without the securitychip, look at tawbook.pdf or trwbook.pdf&lt;br /&gt;
&lt;br /&gt;
3) To my knowledge, the chip is disabled by default on every machine that has it, you need to manually enable it in the BIOS first. I have three ThinkPads currently, two have the security chip, and neither Windows or Linux is able to detect it in the disabled state.&lt;br /&gt;
&lt;br /&gt;
4) Ironically Linux actually has better support for it then windows out-of-the-box. The latest Linux kernels have a driver for it, while MS is not shipping anything that supports it, and will not for some time.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Mr. &amp;quot;67.87.7.65&amp;quot;,&lt;br /&gt;
&lt;br /&gt;
thanks for your comments, much appreciated.&lt;br /&gt;
&lt;br /&gt;
TC can be a good thing, but what TCG (formerly TCPA) wants, can't be a good thing at all and that has nothing to do with paranoia. At least I hope I am not paranoid, just critical about every marketing phrase :-)&lt;br /&gt;
&lt;br /&gt;
I am sorry, if you got the impression, that the ThinkPad models with E.S.S. 1.0 or 2.0 are treacherous. To be honest, I don't have a ThinkPad (not yet) and therefore I can't see for myself, how and what TCG-specs are implemented.&lt;br /&gt;
&lt;br /&gt;
As stated before, Ruediger and Andreas were mostly talking about IBM and MS in their presentation at the 21. Chaos Communication Congress in December 2004 and they seem to talk about this topic for some years now, not only at the congress.&lt;br /&gt;
&lt;br /&gt;
Other sources together with their presentation at 21C3 let me come to the conclusion, that you can't belive the statements of the TCG and their members concerning your (cyber) civil rights and your right of freedom of choice as user and owner of degitial devices such as laptops equipped with a 'Fritz'-chip.&lt;br /&gt;
&lt;br /&gt;
I thought, the article about E.S.S. was a little bit too superficial and the dispute and the critics were not mentionend at all. The EMbedded Security Subsystem sounded like a fantastic thing, that every laptop building and selling company should implement. But why was IBM using that new name and not 'Fritz'-chip or TCG or TCPA? Guess why... :-)&lt;br /&gt;
&lt;br /&gt;
On the other side, my article was / is very much about the dispute and the critics. Okay. Perhaps I can shorten this a litte bit more, add some stuff from the TCG in it (like Wyrfel asked for) etc.&lt;br /&gt;
&lt;br /&gt;
And I have a suggestion to make: &lt;br /&gt;
&lt;br /&gt;
'''How about putting the list of &amp;quot;TCPA/TCG clean models&amp;quot; into the E.S.S.-article and leaving &amp;quot;Trusted or Treacherous&amp;quot; to talk only about Trusted Computing, the TCG-sepcs and the dispute about that specs and giving the readers the hyperlinks so that they can make a judgement by their own???'''&lt;br /&gt;
&lt;br /&gt;
ThinkWiki would be free of that 'conflict', the copied text paragraphs would be gone, the discussion could end, etc.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 12:16, 6 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Yepp, we could do that - leave the list of ESS featured ThinkPads on the ESS page. I think we don't even need the 'clean'-list, since it is just every ThinkPad that doesn't have it. ;-)&lt;br /&gt;
&lt;br /&gt;
However, i agree to &amp;quot;67.87.7.65&amp;quot; ;-) in his impression. He's right about that even of the ESS featured models, some don't have the chip. He's also right about that with the current implementation in ThinkPads you are pretty free to choose using it or not using it. Hence it's a feature. As i see it trouble arises from different sides... the software and the law. These both could eventually force you using it. However, i think there's no need to by a A30 or whatever, just because it doesn't feature that chip. You can buy any other ThinkPad, never enable the chip and be happy. What this article is good for, however, is to make people concious about both, what it really can do, and what privacy and security risks are involved with it.&lt;br /&gt;
&lt;br /&gt;
And BTW, i think that your assumtion of IBM using the ESS name instead of TCG/TCPA to confuse people is a little paranoid. ;-) Look at any IBM page about the ESS and you'll find the words &amp;quot;TCG compliant&amp;quot; within the first sentences, linking to the TCG page. Being suspicious is good, but don't give in to speculations too much.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
no, no, don't get me worng please. The new name by IBM is not to confuse people, but to have it copyrighted and stuff like that.&lt;br /&gt;
&lt;br /&gt;
Gues why IBM is calling it UltraBay, Dell is calling it MediaBay and FixBay and the third Company I forgot the name of is calling it SelectBay? &lt;br /&gt;
&lt;br /&gt;
Because they want to keep the rights of their names / marketing phrases and don't want to pay license fees to the competitors. &lt;br /&gt;
&lt;br /&gt;
For example even the Nike Logo (called &amp;quot;swoosh&amp;quot;) is protected due to heavy brand pirating in developing countires and china.&lt;br /&gt;
&lt;br /&gt;
Sniff, I am *not* paranoid.&lt;br /&gt;
&lt;br /&gt;
(-:&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:26, 6 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6206</id>
		<title>Talk:TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6206"/>
		<updated>2005-07-06T19:26:29Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: again: i am not :-)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Discussion about the article &amp;quot;Trusted or Treacherous&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
Please add you comments here. &lt;br /&gt;
&lt;br /&gt;
You can use the &amp;quot;Plus&amp;quot;(+)-Button next to the &amp;quot;edit&amp;quot;-button at the top of this page to add you comments at the right spot ;-)&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 11:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Plagiarism? ==&lt;br /&gt;
&lt;br /&gt;
Large parts of this article apparently consist of unattributed, near-verbatim excerpts from a SANE2004 paper by Weis, Lucks, and Bogk, [http://www.cryptolabs.org/CCC2004TCunendlich/WeisLucksBogkSane2004tcg12.pdf TCG 1.2 - fair play with the 'Fritz' chip?]. Regardless of whether one believes that general political/ethical concerns about Trusted Computing belong on a Thinkpad-specific site, wholesale copying of unidentified, and presumably copyrighted, material is not cool, and could get the whole project in trouble.&lt;br /&gt;
&lt;br /&gt;
I would suggest that the non-original parts of this article be removed and replaced by an external link to the above-mentioned paper; any particularly crucial short excerpts (as permitted by &amp;quot;fair use&amp;quot;) should be clearly identified as such. The specific information about how the TCG specifications are implemented on various Thinkpad models can stay, of course.&lt;br /&gt;
&lt;br /&gt;
== The Source is under Creative Commons, isn't it? ==&lt;br /&gt;
&lt;br /&gt;
Hello Andrzej,&lt;br /&gt;
&lt;br /&gt;
yes, you are right, another version of this text on a website of the presentation of the annual chaos computer club is one of my sources, but I think, that one is under creative commons license by-nc-sa 2.0 de. And are the presentations of the chaos computer congress not also free unless the speakers don't want it??????&lt;br /&gt;
&lt;br /&gt;
This license allows to copy, distribute, display, perform or modify the text as long as it is published under exactly the same creative commons license and licensees may not use the work for commercial purposes - unless they get the licensor's permission.&lt;br /&gt;
&lt;br /&gt;
My problem was, I had a lot more sources in a different language than english and my first drafts were way to long!&lt;br /&gt;
&lt;br /&gt;
It didn't worked to keep it that short but detailed, as Ruediger and Adreas wrote it.&lt;br /&gt;
&lt;br /&gt;
But if you think, after my explanation the actual version is still problematic, I will delete it of course!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:12, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
If the original authors have explicitly published the text under a suitably permissive CC license, there should be no legal problem in using it in a ThinkWiki article. Even in that case, however, the source needs to be clearly identified, and there should be a link to the complete original article.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Okay Andrzej, I will work on that and tell all of you about it in the coming days, if I have enough time for it.&lt;br /&gt;
&lt;br /&gt;
Unless that, feel free to take out the critical passages of the article or modify it, if you have the time and if you want to do it.&lt;br /&gt;
&lt;br /&gt;
But there is a problem: I slightly changed the text, put two sentence together to one etc. How can I now cite the source?&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
No problem; just say that your ThinkWiki article is ''based on'' the Weis et al. paper, and give a reference. The parts of their text that you include don't have to be verbatim copies; indeed, the whole point is that you are creating a ''derived work'' (e.g., by bringing in material from other sources), which they supposedly explicitly allow in the CC license. To be on the safe side, you should probably also include a link to a web page documenting that the original text is indeed freely licensed, or say that you have personally obtained permission from the authors.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;br /&gt;
----&lt;br /&gt;
Agreed. There should be a general statement in the article about the source the article is derived from, or rather sources - i seem to have used different sources of information for some of my edits. ;-) I'll add mine on next edit.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
== Thanks for your work, i like it ==&lt;br /&gt;
&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
thank you very much for editing and restructering of that article.&lt;br /&gt;
&lt;br /&gt;
I think, I know know what you and Andrzej want and I will try in he next days, to change the article in that way, okay?&lt;br /&gt;
&lt;br /&gt;
P.S.: I don't know, why I loose my logged-in status from time to time, perhaps my connection. I am sorry, that there are IP-Adresses instead of my unsername &amp;quot;pitsche&amp;quot;, I hope, no one gets confused, which edit is by me and which one by someone else :-o&lt;br /&gt;
&lt;br /&gt;
Sorry.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:15, 4 Jul 2005 (CEST)&lt;br /&gt;
----&lt;br /&gt;
About your login status: ThinkWiki doesn't cache logins. This means everytime your connection breaks or your browser closes you will have to login again. But don't worry, we can figure out what's from you and if not - it's a Wiki. ;-) I'm doing a lot of edits without being logged in as well.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
----&lt;br /&gt;
== No exact TCG specifications needed ==&lt;br /&gt;
&lt;br /&gt;
Hello again!&lt;br /&gt;
&lt;br /&gt;
I am against writing about the specific specifications, because it will make the article longer and everybody, who is '''really''' interested in the specifications has several possibilities to get it for free in the WWW or from Cryptolabs.org or from the CCC.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:22, 4 Jul 2005 (CEST)&lt;br /&gt;
----&lt;br /&gt;
I think the TCG specifications should appear there somewhere. At least at current state of my knowledge about the subject i'd think that having them there is helpful for the user to understand what ESS 1 and 2 are capable of. Of course we shouldn't post the whole specs, but some really compressed summary, similar to the 'feature-list' in &amp;quot;TC - Trusted Computing&amp;quot;. Pitsche, if you could point me to them i could do it. Also, a link to the original TCPA specs would be good. The links themselves should be added to the Links section.&lt;br /&gt;
&lt;br /&gt;
That's it so far...i like the way we work on this.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
----&lt;br /&gt;
One more thing...&lt;br /&gt;
&lt;br /&gt;
I think the TCPA implementation in current ThinkPads is pretty harmless. At least at it's current software state. You just don't use it (respectively don't install the supporting software layer) and it never gets active. One interesting aspect of finding out what the chip is capable of is if it could be forced to be used by later software upgrades or not.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Wyrfel! &lt;br /&gt;
&lt;br /&gt;
I also like the way we work on this article. I think, their will be a improvement in the end, that makes everybody happy and is interesting for the users of the ThinkWiki. &lt;br /&gt;
&lt;br /&gt;
Now to your comments:&lt;br /&gt;
&lt;br /&gt;
# I deleted the 'exact' TCG-Specifications, because there is a paragraph about ESS 1.0 and ESS 2.0, where I think the informations should be placed about how much TCG is in ESS, &amp;quot;what ESS 1 and 2 are capable of&amp;quot;  and &amp;quot;if it could be forced to be used by later software upgrades or not&amp;quot; (qutoes from you). Correct me if I am wrong, but otherwiese it would be included two times in the article. Or am I making a mistake here?&lt;br /&gt;
# I agree with you: At least one hyperlink to the TCG-Specifications should be included in the &amp;quot;Related Links&amp;quot; (right now it is No. 9 in the Table Of Contents). Perhaps on wednesday or thursday I will do this...&lt;br /&gt;
# I don't know, if the TCPA implementation in current ThinkPads is pretty harmless. I understood Ruediger and Andreas in their presentation at the 21. Chaos Communication Congress very different to that, because the were referring almost only to IBM and Microsoft.  &amp;lt;br /&amp;gt;&lt;br /&gt;
:It might be a rhetorical technique to fascinate their audience and to keep them awake and following. But my impression of them both was, that they are very concerned scientist (or at least CCC-Activists), who really see the current TCG-Implementations that problematic. And I also felt that they don't need to panic the people just for getting more attention and that they would'nt be disappointed, if they could turn their attention to something else and did'nt have to fight against TCPA/TCG/Palladium :-)&lt;br /&gt;
&lt;br /&gt;
P.S.: Effeff, well, how do I say this, hmmm, does anybody know, where I can find a list of 'common market prices' in USD or Euro for used ThinkPads? &lt;br /&gt;
&lt;br /&gt;
Perhaps something like this [http://www.macnews.de/index.php?_mcnpage=6760 www.macnews.de/index.php?_mcnpage=6760] ???? &amp;quot;Jehova, Jehova, Jeh- outch!&amp;quot; ;-)&lt;br /&gt;
&lt;br /&gt;
Background: I was offered a not so much used ThinkPad A30 with a SXGA+ - TFT-Display without any pixelerrors, but some problems at the drive slot at the right side. Specs of it are: CPU 1.0 Ghz, RAM 512 MB, HDD original IBM 60 GB with 5400 rpm and CD-RW/DVD-ROM-Combo drive...&lt;br /&gt;
&lt;br /&gt;
I have much difficulty for naming a price, because I am not familiar with the cost of repairing that drive slot. At eBay I found some A30p around 600,- Euro and a A22p for 529,- Euro -- is the A30 between? :-o &lt;br /&gt;
&lt;br /&gt;
Thanks!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 01:37, 5 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== a bit paranoid? ==&lt;br /&gt;
&lt;br /&gt;
1) The [[Embedded Security Subsystem]] page already contains a list of ThinkPad's that &amp;lt;u&amp;gt;might&amp;lt;/u&amp;gt; have the security chip, no need to start listing older machines that predate it.&lt;br /&gt;
&lt;br /&gt;
2) And noticed how I said &amp;lt;u&amp;gt;might&amp;lt;/u&amp;gt;, because some of the ThinkPads listed had the security chip as a feature that was not available on every model in the range. You can see this on the individual ThinkPad product pages, as it will say that it was available &amp;lt;i&amp;gt;on select models&amp;lt;/i&amp;gt;. So for example it is perfectly possible to get a second-hand R40, T40 or X31 without the chip. If you want to know the exact type-model of machines with or without the securitychip, look at tawbook.pdf or trwbook.pdf&lt;br /&gt;
&lt;br /&gt;
3) To my knowledge, the chip is disabled by default on every machine that has it, you need to manually enable it in the BIOS first. I have three ThinkPads currently, two have the security chip, and neither Windows or Linux is able to detect it in the disabled state.&lt;br /&gt;
&lt;br /&gt;
4) Ironically Linux actually has better support for it then windows out-of-the-box. The latest Linux kernels have a driver for it, while MS is not shipping anything that supports it, and will not for some time.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Mr. &amp;quot;67.87.7.65&amp;quot;,&lt;br /&gt;
&lt;br /&gt;
thanks for your comments, much appreciated.&lt;br /&gt;
&lt;br /&gt;
TC can be a good thing, but what TCG (formerly TCPA) wants, can't be a good thing at all and that has nothing to do with paranoia. At least I hope I am not paranoid, just critical about every marketing phrase :-)&lt;br /&gt;
&lt;br /&gt;
I am sorry, if you got the impression, that the ThinkPad models with E.S.S. 1.0 or 2.0 are treacherous. To be honest, I don't have a ThinkPad (not yet) and therefore I can't see for myself, how and what TCG-specs are implemented.&lt;br /&gt;
&lt;br /&gt;
As stated before, Ruediger and Andreas were mostly talking about IBM and MS in their presentation at the 21. Chaos Communication Congress in December 2004 and they seem to talk about this topic for some years now, not only at the congress.&lt;br /&gt;
&lt;br /&gt;
Other sources together with their presentation at 21C3 let me come to the conclusion, that you can't belive the statements of the TCG and their members concerning your (cyber) civil rights and your right of freedom of choice as user and owner of degitial devices such as laptops equipped with a 'Fritz'-chip.&lt;br /&gt;
&lt;br /&gt;
I thought, the article about E.S.S. was a little bit too superficial and the dispute and the critics were not mentionend at all. The EMbedded Security Subsystem sounded like a fantastic thing, that every laptop building and selling company should implement. But why was IBM using that new name and not 'Fritz'-chip or TCG or TCPA? Guess why... :-)&lt;br /&gt;
&lt;br /&gt;
On the other side, my article was / is very much about the dispute and the critics. Okay. Perhaps I can shorten this a litte bit more, add some stuff from the TCG in it (like Wyrfel asked for) etc.&lt;br /&gt;
&lt;br /&gt;
And I have a suggestion to make: &lt;br /&gt;
&lt;br /&gt;
'''How about putting the list of &amp;quot;TCPA/TCG clean models&amp;quot; into the E.S.S.-article and leaving &amp;quot;Trusted or Treacherous&amp;quot; to talk only about Trusted Computing, the TCG-sepcs and the dispute about that specs and giving the readers the hyperlinks so that they can make a judgement by their own???'''&lt;br /&gt;
&lt;br /&gt;
ThinkWiki would be free of that 'conflict', the copied text paragraphs would be gone, the discussion could end, etc.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 12:16, 6 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Yepp, we could do that - leave the list of ESS featured ThinkPads on the ESS page. I think we don't even need the 'clean'-list, since it is just every ThinkPad that doesn't have it. ;-)&lt;br /&gt;
&lt;br /&gt;
However, i agree to &amp;quot;67.87.7.65&amp;quot; ;-) in his impression. He's right about that even of the ESS featured models, some don't have the chip. He's also right about that with the current implementation in ThinkPads you are pretty free to choose using it or not using it. Hence it's a feature. As i see it trouble arises from different sides... the software and the law. These both could eventually force you using it. However, i think there's no need to by a A30 or whatever, just because it doesn't feature that chip. You can buy any other ThinkPad, never enable the chip and be happy. What this article is good for, however, is to make people concious about both, what it really can do, and what privacy and security risks are involved with it.&lt;br /&gt;
&lt;br /&gt;
And BTW, i think that your assumtion of IBM using the ESS name instead of TCG/TCPA to confuse people is a little paranoid. ;-) Look at any IBM page about the ESS and you'll find the words &amp;quot;TCG compliant&amp;quot; within the first sentences, linking to the TCG page. Being suspicious is good, but don't give in to speculations too much.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
no, no, don't get me worng please. The new name by IBM is not to confuse people, but to have it copyrighted and stuff like that.&lt;br /&gt;
&lt;br /&gt;
Gues why IBM is calling it UltraBay, Dell is calling it MediaBay and FixBay and the third Company I forgot the name of is calling it SelectBay? Because they want to keep the rights of their names / marketing phrases and don#t want to be license fees to the competitors. For example even the Nike Logo (called &amp;quot;swoosh&amp;quot;) is protected due to heavy brand pirating in developing countires and china.&lt;br /&gt;
&lt;br /&gt;
Sniff, I am *not* paranoid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
(-:&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:26, 6 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6202</id>
		<title>Talk:TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6202"/>
		<updated>2005-07-06T10:16:32Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: pitsche's answer to Mr. &amp;quot;67.87.7.65&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Discussion about the article &amp;quot;Trusted or Treacherous&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
Please add you comments here. &lt;br /&gt;
&lt;br /&gt;
You can use the &amp;quot;Plus&amp;quot;(+)-Button next to the &amp;quot;edit&amp;quot;-button at the top of this page to add you comments at the right spot ;-)&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 11:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Plagiarism? ==&lt;br /&gt;
&lt;br /&gt;
Large parts of this article apparently consist of unattributed, near-verbatim excerpts from a SANE2004 paper by Weis, Lucks, and Bogk, [http://www.cryptolabs.org/CCC2004TCunendlich/WeisLucksBogkSane2004tcg12.pdf TCG 1.2 - fair play with the 'Fritz' chip?]. Regardless of whether one believes that general political/ethical concerns about Trusted Computing belong on a Thinkpad-specific site, wholesale copying of unidentified, and presumably copyrighted, material is not cool, and could get the whole project in trouble.&lt;br /&gt;
&lt;br /&gt;
I would suggest that the non-original parts of this article be removed and replaced by an external link to the above-mentioned paper; any particularly crucial short excerpts (as permitted by &amp;quot;fair use&amp;quot;) should be clearly identified as such. The specific information about how the TCG specifications are implemented on various Thinkpad models can stay, of course.&lt;br /&gt;
&lt;br /&gt;
== The Source is under Creative Commons, isn't it? ==&lt;br /&gt;
&lt;br /&gt;
Hello Andrzej,&lt;br /&gt;
&lt;br /&gt;
yes, you are right, another version of this text on a website of the presentation of the annual chaos computer club is one of my sources, but I think, that one is under creative commons license by-nc-sa 2.0 de. And are the presentations of the chaos computer congress not also free unless the speakers don't want it??????&lt;br /&gt;
&lt;br /&gt;
This license allows to copy, distribute, display, perform or modify the text as long as it is published under exactly the same creative commons license and licensees may not use the work for commercial purposes - unless they get the licensor's permission.&lt;br /&gt;
&lt;br /&gt;
My problem was, I had a lot more sources in a different language than english and my first drafts were way to long!&lt;br /&gt;
&lt;br /&gt;
It didn't worked to keep it that short but detailed, as Ruediger and Adreas wrote it.&lt;br /&gt;
&lt;br /&gt;
But if you think, after my explanation the actual version is still problematic, I will delete it of course!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:12, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
If the original authors have explicitly published the text under a suitably permissive CC license, there should be no legal problem in using it in a ThinkWiki article. Even in that case, however, the source needs to be clearly identified, and there should be a link to the complete original article.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Okay Andrzej, I will work on that and tell all of you about it in the coming days, if I have enough time for it.&lt;br /&gt;
&lt;br /&gt;
Unless that, feel free to take out the critical passages of the article or modify it, if you have the time and if you want to do it.&lt;br /&gt;
&lt;br /&gt;
But there is a problem: I slightly changed the text, put two sentence together to one etc. How can I now cite the source?&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
No problem; just say that your ThinkWiki article is ''based on'' the Weis et al. paper, and give a reference. The parts of their text that you include don't have to be verbatim copies; indeed, the whole point is that you are creating a ''derived work'' (e.g., by bringing in material from other sources), which they supposedly explicitly allow in the CC license. To be on the safe side, you should probably also include a link to a web page documenting that the original text is indeed freely licensed, or say that you have personally obtained permission from the authors.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;br /&gt;
----&lt;br /&gt;
Agreed. There should be a general statement in the article about the source the article is derived from, or rather sources - i seem to have used different sources of information for some of my edits. ;-) I'll add mine on next edit.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
== Thanks for your work, i like it ==&lt;br /&gt;
&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
thank you very much for editing and restructering of that article.&lt;br /&gt;
&lt;br /&gt;
I think, I know know what you and Andrzej want and I will try in he next days, to change the article in that way, okay?&lt;br /&gt;
&lt;br /&gt;
P.S.: I don't know, why I loose my logged-in status from time to time, perhaps my connection. I am sorry, that there are IP-Adresses instead of my unsername &amp;quot;pitsche&amp;quot;, I hope, no one gets confused, which edit is by me and which one by someone else :-o&lt;br /&gt;
&lt;br /&gt;
Sorry.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:15, 4 Jul 2005 (CEST)&lt;br /&gt;
----&lt;br /&gt;
About your login status: ThinkWiki doesn't cache logins. This means everytime your connection breaks or your browser closes you will have to login again. But don't worry, we can figure out what's from you and if not - it's a Wiki. ;-) I'm doing a lot of edits without being logged in as well.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
----&lt;br /&gt;
== No exact TCG specifications needed ==&lt;br /&gt;
&lt;br /&gt;
Hello again!&lt;br /&gt;
&lt;br /&gt;
I am against writing about the specific specifications, because it will make the article longer and everybody, who is '''really''' interested in the specifications has several possibilities to get it for free in the WWW or from Cryptolabs.org or from the CCC.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:22, 4 Jul 2005 (CEST)&lt;br /&gt;
----&lt;br /&gt;
I think the TCG specifications should appear there somewhere. At least at current state of my knowledge about the subject i'd think that having them there is helpful for the user to understand what ESS 1 and 2 are capable of. Of course we shouldn't post the whole specs, but some really compressed summary, similar to the 'feature-list' in &amp;quot;TC - Trusted Computing&amp;quot;. Pitsche, if you could point me to them i could do it. Also, a link to the original TCPA specs would be good. The links themselves should be added to the Links section.&lt;br /&gt;
&lt;br /&gt;
That's it so far...i like the way we work on this.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
----&lt;br /&gt;
One more thing...&lt;br /&gt;
&lt;br /&gt;
I think the TCPA implementation in current ThinkPads is pretty harmless. At least at it's current software state. You just don't use it (respectively don't install the supporting software layer) and it never gets active. One interesting aspect of finding out what the chip is capable of is if it could be forced to be used by later software upgrades or not.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Wyrfel! &lt;br /&gt;
&lt;br /&gt;
I also like the way we work on this article. I think, their will be a improvement in the end, that makes everybody happy and is interesting for the users of the ThinkWiki. &lt;br /&gt;
&lt;br /&gt;
Now to your comments:&lt;br /&gt;
&lt;br /&gt;
# I deleted the 'exact' TCG-Specifications, because there is a paragraph about ESS 1.0 and ESS 2.0, where I think the informations should be placed about how much TCG is in ESS, &amp;quot;what ESS 1 and 2 are capable of&amp;quot;  and &amp;quot;if it could be forced to be used by later software upgrades or not&amp;quot; (qutoes from you). Correct me if I am wrong, but otherwiese it would be included two times in the article. Or am I making a mistake here?&lt;br /&gt;
# I agree with you: At least one hyperlink to the TCG-Specifications should be included in the &amp;quot;Related Links&amp;quot; (right now it is No. 9 in the Table Of Contents). Perhaps on wednesday or thursday I will do this...&lt;br /&gt;
# I don't know, if the TCPA implementation in current ThinkPads is pretty harmless. I understood Ruediger and Andreas in their presentation at the 21. Chaos Communication Congress very different to that, because the were referring almost only to IBM and Microsoft.  &amp;lt;br /&amp;gt;&lt;br /&gt;
:It might be a rhetorical technique to fascinate their audience and to keep them awake and following. But my impression of them both was, that they are very concerned scientist (or at least CCC-Activists), who really see the current TCG-Implementations that problematic. And I also felt that they don't need to panic the people just for getting more attention and that they would'nt be disappointed, if they could turn their attention to something else and did'nt have to fight against TCPA/TCG/Palladium :-)&lt;br /&gt;
&lt;br /&gt;
P.S.: Effeff, well, how do I say this, hmmm, does anybody know, where I can find a list of 'common market prices' in USD or Euro for used ThinkPads? &lt;br /&gt;
&lt;br /&gt;
Perhaps something like this [http://www.macnews.de/index.php?_mcnpage=6760 www.macnews.de/index.php?_mcnpage=6760] ???? &amp;quot;Jehova, Jehova, Jeh- outch!&amp;quot; ;-)&lt;br /&gt;
&lt;br /&gt;
Background: I was offered a not so much used ThinkPad A30 with a SXGA+ - TFT-Display without any pixelerrors, but some problems at the drive slot at the right side. Specs of it are: CPU 1.0 Ghz, RAM 512 MB, HDD original IBM 60 GB with 5400 rpm and CD-RW/DVD-ROM-Combo drive...&lt;br /&gt;
&lt;br /&gt;
I have much difficulty for naming a price, because I am not familiar with the cost of repairing that drive slot. At eBay I found some A30p around 600,- Euro and a A22p for 529,- Euro -- is the A30 between? :-o &lt;br /&gt;
&lt;br /&gt;
Thanks!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 01:37, 5 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== a bit paranoid? ==&lt;br /&gt;
&lt;br /&gt;
1) The [[Embedded Security Subsystem]] page already contains a list of ThinkPad's that &amp;lt;u&amp;gt;might&amp;lt;/u&amp;gt; have the security chip, no need to start listing older machines that predate it.&lt;br /&gt;
&lt;br /&gt;
2) And noticed how I said &amp;lt;u&amp;gt;might&amp;lt;/u&amp;gt;, because some of the ThinkPads listed had the security chip as a feature that was not available on every model in the range. You can see this on the individual ThinkPad product pages, as it will say that it was available &amp;lt;i&amp;gt;on select models&amp;lt;/i&amp;gt;. So for example it is perfectly possible to get a second-hand R40, T40 or X31 without the chip. If you want to know the exact type-model of machines with or without the securitychip, look at tawbook.pdf or trwbook.pdf&lt;br /&gt;
&lt;br /&gt;
3) To my knowledge, the chip is disabled by default on every machine that has it, you need to manually enable it in the BIOS first. I have three ThinkPads currently, two have the security chip, and neither Windows or Linux is able to detect it in the disabled state.&lt;br /&gt;
&lt;br /&gt;
4) Ironically Linux actually has better support for it then windows out-of-the-box. The latest Linux kernels have a driver for it, while MS is not shipping anything that supports it, and will not for some time.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Mr. &amp;quot;67.87.7.65&amp;quot;,&lt;br /&gt;
&lt;br /&gt;
thanks for your comments, much appreciated.&lt;br /&gt;
&lt;br /&gt;
TC can be a good thing, but what TCG (formerly TCPA) wants, can't be a good thing at all and that has nothing to do with paranoia. At least I hope I am not paranoid, just critical about every marketing phrase :-)&lt;br /&gt;
&lt;br /&gt;
I am sorry, if you got the impression, that the ThinkPad models with E.S.S. 1.0 or 2.0 are treacherous. To be honest, I don't have a ThinkPad (not yet) and therefore I can't see for myself, how and what TCG-specs are implemented.&lt;br /&gt;
&lt;br /&gt;
As stated before, Ruediger and Andreas were mostly talking about IBM and MS in their presentation at the 21. Chaos Communication Congress in December 2004 and they seem to talk about this topic for some years now, not only at the congress.&lt;br /&gt;
&lt;br /&gt;
Other sources together with their presentation at 21C3 let me come to the conclusion, that you can't belive the statements of the TCG and their members concerning your (cyber) civil rights and your right of freedom of choice as user and owner of degitial devices such as laptops equipped with a 'Fritz'-chip.&lt;br /&gt;
&lt;br /&gt;
I thought, the article about E.S.S. was a little bit too superficial and the dispute and the critics were not mentionend at all. The EMbedded Security Subsystem sounded like a fantastic thing, that every laptop building and selling company should implement. But why was IBM using that new name and not 'Fritz'-chip or TCG or TCPA? Guess why... :-)&lt;br /&gt;
&lt;br /&gt;
On the other side, my article was / is very much about the dispute and the critics. Okay. Perhaps I can shorten this a litte bit more, add some stuff from the TCG in it (like Wyrfel asked for) etc.&lt;br /&gt;
&lt;br /&gt;
And I have a suggestion to make: &lt;br /&gt;
&lt;br /&gt;
'''How about putting the list of &amp;quot;TCPA/TCG clean models&amp;quot; into the E.S.S.-article and leaving &amp;quot;Trusted or Treacherous&amp;quot; to talk only about Trusted Computing, the TCG-sepcs and the dispute about that specs and giving the readers the hyperlinks so that they can make a judgement by their own???'''&lt;br /&gt;
&lt;br /&gt;
ThinkWiki would be free of that 'conflict', the copied text paragraphs would be gone, the discussion could end, etc.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 12:16, 6 Jul 2005 (CEST)&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Embedded_Security_Subsystem&amp;diff=6207</id>
		<title>Embedded Security Subsystem</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Embedded_Security_Subsystem&amp;diff=6207"/>
		<updated>2005-07-06T09:49:29Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: minor edits to improve the neutrality&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|style=&amp;quot;vertical-align:top;padding-right:20px;width:10px;&amp;quot; | [[Image:ESS.jpg|IBM Embedded Security Subsystem]] __NOTOC__&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: 0; margin-right:10px; border: 1px solid #dfdfdf; padding: 0em 1em 1em 1em; background-color:#F8F8FF; align:right;&amp;quot;&amp;gt;&lt;br /&gt;
=== The Embedded Security Subsystem ===&lt;br /&gt;
The Embedded Security Subsystem is nothing but a chip installed on the Thinkpads mainboard that can take care of certain security related tasks conforming to the TCPA standard. It was first introduced among the T23 models and is now under the name Embedded Security Subsystem 2.0 an integral part of most of the modern Thinkpads. The functions of the chip are bound to three main groups:&lt;br /&gt;
* public key functions&lt;br /&gt;
* trusted boot functions&lt;br /&gt;
* initialization and management functions&lt;br /&gt;
&lt;br /&gt;
The purpose of the whole thing is to keep the users sensitive data out of range from software based attacks (like viruses, internet attacks etc.). One way the chip offers to achieve this is by providing storage for keys along with the neccessary functions to handle them within itself, so that a i.e. a private key never has to leave the chip (can't be seen by any piece of software). Besides this there are more complex topics covered by the functionality of the chip. If you want to find out more about it you can find good documents on the [http://www.research.ibm.com/gsal/tcpa/ IBM Research TCPA resources page].&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Trusted or Treacherous?==&lt;br /&gt;
&lt;br /&gt;
TC - Trusted Computing - will be the biggest change of the information landscape since decades. Besides positive features like a more secure hardware storage for cryptographic keys, an analysis of the proposed TCG-standards shows some problematic properties. &amp;lt;br /&amp;gt;&lt;br /&gt;
As Thinkpads of recent generations following the Thinkpad T23 ([http://www.thinkwiki.org/wiki/Embedded_Security_Subsystem#Models_featuring_this_Technology see the complete list of models]) are equipped with this disputed TCG-/TCPA-Technology, it can be interesting, which promises of the TCG are fulfilled inside your ThinkPad and which parts of the TCG-specifications still seem to be a privacy issue for every user of digital devices like a MP3-player or a ThinkPad - so please read [[TCPA/TCG - Trusted or Treacherous|this article]] for more details.&lt;br /&gt;
&lt;br /&gt;
==Linux Support==&lt;br /&gt;
Two linux drivers are available, a [[tpm|classical one]] and a [[tpmdd|newer one]].&lt;br /&gt;
Coverage of functionality of the first is unknown so far, the second is part of a bigger project aiming to provide a usable security framework.&lt;br /&gt;
&lt;br /&gt;
David Stafford (one of the developers of the tpm code at IBM) on March 10, 2005 sent me the most recent version of the tpm-kml code. With his permission, I quote his email:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;I am attaching our latest driver and library.&lt;br /&gt;
This version is in the process of kernel mailing list review, and&lt;br /&gt;
will hopefully be accepted into the official kernel. It works&lt;br /&gt;
much better across various 2.6 kernels. Note that this builds&lt;br /&gt;
three modules tpm, tpm_atmel, and tpm_nsc. You modprobe the&lt;br /&gt;
tpm_atmel (for all current shipping atmel based systems), or&lt;br /&gt;
tpm_nsc (for the coming national based systems).&lt;br /&gt;
&lt;br /&gt;
Also note that there is a conflict with the snd-intel8x0&lt;br /&gt;
kernel module (they each try to grab the LPC bus). You can&lt;br /&gt;
either: load the tpm modules first (such as in initrd or&lt;br /&gt;
rc.sysinit, before sound), or recompile the snd-intel8x0, turning&lt;br /&gt;
off the MIDI and JOYSTICK support. The latest 2.6.11 version&lt;br /&gt;
of snd-intel8x0 also reportedly fixes things.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Compiling this library was easy. Compiling the driver on my 2.6.8-686 (debian testing) laptop failed. But the library works with the driver I compiled from the tpm-2.0 package IBM made available on its pages (see the links below).&lt;br /&gt;
&lt;br /&gt;
Gijs&lt;br /&gt;
&lt;br /&gt;
The T43 requires a patch posted to the LKML by Kylene Jo Hall: [http://marc.theaimsgroup.com/?l=linux-kernel&amp;amp;m=111884603309146&amp;amp;w=2 LKML posting]. An updated patch for linux 2.6.12 is available [http://shamrock.dyndns.org/~ln/linux/tpm_2.6.12.diff here].&lt;br /&gt;
&lt;br /&gt;
==Related Links==&lt;br /&gt;
*[http://www.pc.ibm.com/us/think/thinkvantagetech/security.html IBMs ThinkVantage&amp;lt;sup&amp;gt;TM&amp;lt;/sup&amp;gt; Technologies Embedded Security Subsystem page]&lt;br /&gt;
*[http://www.pc.ibm.com/presentations/us/thinkvantage/56/index.html?shortcut=ess&amp;amp; IBMs ThinkVantage&amp;lt;sup&amp;gt;TM&amp;lt;/sup&amp;gt; Technologies Flash presentation - Embedded Security Subsystem]&lt;br /&gt;
*[http://www.research.ibm.com/gsal/tcpa/ IBM Research TCPA resources page]&lt;br /&gt;
*[http://www.prosec.rub.de/trusted_grub.html Trusted Grub]&lt;br /&gt;
&lt;br /&gt;
==Models featuring this Technology==&lt;br /&gt;
'''IBM Embedded Security Subsystem'''&lt;br /&gt;
*ThinkPad {{R31}}&lt;br /&gt;
*ThinkPad {{T23}}, {{T30}}&lt;br /&gt;
*ThinkPad {{X23}}, {{X24}}&lt;br /&gt;
'''IBM Embedded Security Subsystem 2.0'''&lt;br /&gt;
*ThinkPad {{R32}}, {{R40}}, {{R50}}, {{R50p}}, {{R51}}, {{R52}}&lt;br /&gt;
*ThinkPad {{T40}}, {{T40p}}, {{T41}}, {{T41p}}, {{T42}}, {{T42p}}, {{T43}}, {{T43p}}&lt;br /&gt;
*ThinkPad {{X30}}, {{X31}}, {{X32}}, {{X40}}, {{X41}}, {{X41T}}&lt;br /&gt;
[[Category:Glossary]]&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6160</id>
		<title>Talk:TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6160"/>
		<updated>2005-07-04T23:37:49Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: /* No exact TCG specifications needed */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Discussion about the article &amp;quot;Trusted or Treacherous&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
Please add you comments here. &lt;br /&gt;
&lt;br /&gt;
You can use the &amp;quot;Plus&amp;quot;(+)-Button next to the &amp;quot;edit&amp;quot;-button at the top of this page to add you comments at the right spot ;-)&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 11:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Plagiarism? ==&lt;br /&gt;
&lt;br /&gt;
Large parts of this article apparently consist of unattributed, near-verbatim excerpts from a SANE2004 paper by Weis, Lucks, and Bogk, [http://www.cryptolabs.org/CCC2004TCunendlich/WeisLucksBogkSane2004tcg12.pdf TCG 1.2 - fair play with the 'Fritz' chip?]. Regardless of whether one believes that general political/ethical concerns about Trusted Computing belong on a Thinkpad-specific site, wholesale copying of unidentified, and presumably copyrighted, material is not cool, and could get the whole project in trouble.&lt;br /&gt;
&lt;br /&gt;
I would suggest that the non-original parts of this article be removed and replaced by an external link to the above-mentioned paper; any particularly crucial short excerpts (as permitted by &amp;quot;fair use&amp;quot;) should be clearly identified as such. The specific information about how the TCG specifications are implemented on various Thinkpad models can stay, of course.&lt;br /&gt;
&lt;br /&gt;
== The Source is under Creative Commons, isn't it? ==&lt;br /&gt;
&lt;br /&gt;
Hello Andrzej,&lt;br /&gt;
&lt;br /&gt;
yes, you are right, another version of this text on a website of the presentation of the annual chaos computer club is one of my sources, but I think, that one is under creative commons license by-nc-sa 2.0 de. And are the presentations of the chaos computer congress not also free unless the speakers don't want it??????&lt;br /&gt;
&lt;br /&gt;
This license allows to copy, distribute, display, perform or modify the text as long as it is published under exactly the same creative commons license and licensees may not use the work for commercial purposes - unless they get the licensor's permission.&lt;br /&gt;
&lt;br /&gt;
My problem was, I had a lot more sources in a different language than english and my first drafts were way to long!&lt;br /&gt;
&lt;br /&gt;
It didn't worked to keep it that short but detailed, as Ruediger and Adreas wrote it.&lt;br /&gt;
&lt;br /&gt;
But if you think, after my explanation the actual version is still problematic, I will delete it of course!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:12, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
If the original authors have explicitly published the text under a suitably permissive CC license, there should be no legal problem in using it in a ThinkWiki article. Even in that case, however, the source needs to be clearly identified, and there should be a link to the complete original article.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Okay Andrzej, I will work on that and tell all of you about it in the coming days, if I have enough time for it.&lt;br /&gt;
&lt;br /&gt;
Unless that, feel free to take out the critical passages of the article or modify it, if you have the time and if you want to do it.&lt;br /&gt;
&lt;br /&gt;
But there is a problem: I slightly changed the text, put two sentence together to one etc. How can I now cite the source?&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
No problem; just say that your ThinkWiki article is ''based on'' the Weis et al. paper, and give a reference. The parts of their text that you include don't have to be verbatim copies; indeed, the whole point is that you are creating a ''derived work'' (e.g., by bringing in material from other sources), which they supposedly explicitly allow in the CC license. To be on the safe side, you should probably also include a link to a web page documenting that the original text is indeed freely licensed, or say that you have personally obtained permission from the authors.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;br /&gt;
----&lt;br /&gt;
Agreed. There should be a general statement in the article about the source the article is derived from, or rather sources - i seem to have used different sources of information for some of my edits. ;-) I'll add mine on next edit.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
== Thanks for your work, i like it ==&lt;br /&gt;
&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
thank you very much for editing and restructering of that article.&lt;br /&gt;
&lt;br /&gt;
I think, I know know what you and Andrzej want and I will try in he next days, to change the article in that way, okay?&lt;br /&gt;
&lt;br /&gt;
P.S.: I don't know, why I loose my logged-in status from time to time, perhaps my connection. I am sorry, that there are IP-Adresses instead of my unsername &amp;quot;pitsche&amp;quot;, I hope, no one gets confused, which edit is by me and which one by someone else :-o&lt;br /&gt;
&lt;br /&gt;
Sorry.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:15, 4 Jul 2005 (CEST)&lt;br /&gt;
----&lt;br /&gt;
About your login status: ThinkWiki doesn't cache logins. This means everytime your connection breaks or your browser closes you will have to login again. But don't worry, we can figure out what's from you and if not - it's a Wiki. ;-) I'm doing a lot of edits without being logged in as well.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
----&lt;br /&gt;
== No exact TCG specifications needed ==&lt;br /&gt;
&lt;br /&gt;
Hello again!&lt;br /&gt;
&lt;br /&gt;
I am against writing about the specific specifications, because it will make the article longer and everybody, who is '''really''' interested in the specifications has several possibilities to get it for free in the WWW or from Cryptolabs.org or from the CCC.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:22, 4 Jul 2005 (CEST)&lt;br /&gt;
----&lt;br /&gt;
I think the TCG specifications should appear there somewhere. At least at current state of my knowledge about the subject i'd think that having them there is helpful for the user to understand what ESS 1 and 2 are capable of. Of course we shouldn't post the whole specs, but some really compressed summary, similar to the 'feature-list' in &amp;quot;TC - Trusted Computing&amp;quot;. Pitsche, if you could point me to them i could do it. Also, a link to the original TCPA specs would be good. The links themselves should be added to the Links section.&lt;br /&gt;
&lt;br /&gt;
That's it so far...i like the way we work on this.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
----&lt;br /&gt;
One more thing...&lt;br /&gt;
&lt;br /&gt;
I think the TCPA implementation in current ThinkPads is pretty harmless. At least at it's current software state. You just don't use it (respectively don't install the supporting software layer) and it never gets active. One interesting aspect of finding out what the chip is capable of is if it could be forced to be used by later software upgrades or not.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Wyrfel! &lt;br /&gt;
&lt;br /&gt;
I also like the way we work on this article. I think, their will be a improvement in the end, that makes everybody happy and is interesting for the users of the ThinkWiki. &lt;br /&gt;
&lt;br /&gt;
Now to your comments:&lt;br /&gt;
&lt;br /&gt;
# I deleted the 'exact' TCG-Specifications, because there is a paragraph about ESS 1.0 and ESS 2.0, where I think the informations should be placed about how much TCG is in ESS, &amp;quot;what ESS 1 and 2 are capable of&amp;quot;  and &amp;quot;if it could be forced to be used by later software upgrades or not&amp;quot; (qutoes from you). Correct me if I am wrong, but otherwiese it would be included two times in the article. Or am I making a mistake here?&lt;br /&gt;
# I agree with you: At least one hyperlink to the TCG-Specifications should be included in the &amp;quot;Related Links&amp;quot; (right now it is No. 9 in the Table Of Contents). Perhaps on wednesday or thursday I will do this...&lt;br /&gt;
# I don't know, if the TCPA implementation in current ThinkPads is pretty harmless. I understood Ruediger and Andreas in their presentation at the 21. Chaos Communication Congress very different to that, because the were referring almost only to IBM and Microsoft.  &amp;lt;br /&amp;gt;&lt;br /&gt;
:It might be a rhetorical technique to fascinate their audience and to keep them awake and following. But my impression of them both was, that they are very concerned scientist (or at least CCC-Activists), who really see the current TCG-Implementations that problematic. And I also felt that they don't need to panic the people just for getting more attention and that they would'nt be disappointed, if they could turn their attention to something else and did'nt have to fight against TCPA/TCG/Palladium :-)&lt;br /&gt;
&lt;br /&gt;
P.S.: Effeff, well, how do I say this, hmmm, does anybody know, where I can find a list of 'common market prices' in USD or Euro for used ThinkPads? &lt;br /&gt;
&lt;br /&gt;
Perhaps something like this [http://www.macnews.de/index.php?_mcnpage=6760 www.macnews.de/index.php?_mcnpage=6760] ???? &amp;quot;Jehova, Jehova, Jeh- outch!&amp;quot; ;-)&lt;br /&gt;
&lt;br /&gt;
Background: I was offered a not so much used ThinkPad A30 with a SXGA+ - TFT-Display without any pixelerrors, but some problems at the drive slot at the right side. Specs of it are: CPU 1.0 Ghz, RAM 512 MB, HDD original IBM 60 GB with 5400 rpm and CD-RW/DVD-ROM-Combo drive...&lt;br /&gt;
&lt;br /&gt;
I have much difficulty for naming a price, because I am not familiar with the cost of repairing that drive slot. At eBay I found some A30p around 600,- Euro and a A22p for 529,- Euro -- is the A30 between? :-o &lt;br /&gt;
&lt;br /&gt;
Thanks!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 01:37, 5 Jul 2005 (CEST)&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=User:Pitsche&amp;diff=16792</id>
		<title>User:Pitsche</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=User:Pitsche&amp;diff=16792"/>
		<updated>2005-07-04T19:48:24Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;hello this is pitsche. &lt;br /&gt;
&lt;br /&gt;
i wanted to buy a thinkpad, but than i heard about the TCPA- or TCG-Chip inside the models build after 2000.&lt;br /&gt;
&lt;br /&gt;
it took me some days to collect the needed information and hyperlinks, so i want to share all this with you ;-)&lt;br /&gt;
&lt;br /&gt;
BTW: The Thinkpad, that I now want to buy is a ThinkPad A30 or a ThinkPad A22p or something like that with a resolution from SXGA+ or UXGA, if it has only '''no''' Embedded Security Subsystem :-) Why that? Read [[TCPA/TCG - Trusted or Treacherous|this article]] to learn why...&lt;br /&gt;
&lt;br /&gt;
'''if you want to comment on me, please don't do it here, use the &amp;quot;user discussion&amp;quot; instead. thank you! '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 19:20, 3 Jul 2005 (CEST)&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:48, 4 Jul 2005 (CEST)&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6137</id>
		<title>Talk:TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6137"/>
		<updated>2005-07-04T19:40:12Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Discussion about the article &amp;quot;Trusted or Treacherous&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
Please add you comments here. &lt;br /&gt;
&lt;br /&gt;
You can use the &amp;quot;Plus&amp;quot;(+)-Button next to the &amp;quot;edit&amp;quot;-button at the top of this page to add you comments at the right spot ;-)&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 11:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Plagiarism? ==&lt;br /&gt;
&lt;br /&gt;
Large parts of this article apparently consist of unattributed, near-verbatim excerpts from a SANE2004 paper by Weis, Lucks, and Bogk, [http://www.cryptolabs.org/CCC2004TCunendlich/WeisLucksBogkSane2004tcg12.pdf TCG 1.2 - fair play with the 'Fritz' chip?]. Regardless of whether one believes that general political/ethical concerns about Trusted Computing belong on a Thinkpad-specific site, wholesale copying of unidentified, and presumably copyrighted, material is not cool, and could get the whole project in trouble.&lt;br /&gt;
&lt;br /&gt;
I would suggest that the non-original parts of this article be removed and replaced by an external link to the above-mentioned paper; any particularly crucial short excerpts (as permitted by &amp;quot;fair use&amp;quot;) should be clearly identified as such. The specific information about how the TCG specifications are implemented on various Thinkpad models can stay, of course.&lt;br /&gt;
&lt;br /&gt;
== The Source is under Creative Commons, isn't it? ==&lt;br /&gt;
&lt;br /&gt;
Hello Andrzej,&lt;br /&gt;
&lt;br /&gt;
yes, you are right, another version of this text on a website of the presentation of the annual chaos computer club is one of my sources, but I think, that one is under creative commons license by-nc-sa 2.0 de. And are the presentations of the chaos computer congress not also free unless the speakers don't want it??????&lt;br /&gt;
&lt;br /&gt;
This license allows to copy, distribute, display, perform or modify the text as long as it is published under exactly the same creative commons license and licensees may not use the work for commercial purposes - unless they get the licensor's permission.&lt;br /&gt;
&lt;br /&gt;
My problem was, I had a lot more sources in a different language than english and my first drafts were way to long!&lt;br /&gt;
&lt;br /&gt;
It didn't worked to keep it that short but detailed, as Ruediger and Adreas wrote it.&lt;br /&gt;
&lt;br /&gt;
But if you think, after my explanation the actual version is still problematic, I will delete it of course!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:12, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
If the original authors have explicitly published the text under a suitably permissive CC license, there should be no legal problem in using it in a ThinkWiki article. Even in that case, however, the source needs to be clearly identified, and there should be a link to the complete original article.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Okay Andrzej, I will work on that and tell all of you about it in the coming days, if I have enough time for it.&lt;br /&gt;
&lt;br /&gt;
Unless that, feel free to take out the critical passages of the article or modify it, if you have the time and if you want to do it.&lt;br /&gt;
&lt;br /&gt;
But there is a problem: I slightly changed the text, put two sentence together to one etc. How can I now cite the source?&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Thanks for your work, i like it ==&lt;br /&gt;
&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
thank you very much for editing and restructering of that article.&lt;br /&gt;
&lt;br /&gt;
I think, I know know what you and Andrzej want and I will try in he next days, to change the article in that way, okay?&lt;br /&gt;
&lt;br /&gt;
P.S.: I don't know, why I loose my logged-in status from time to time, perhaps my connection. I am sorry, that there are IP-Adresses instead of my unsername &amp;quot;pitsche&amp;quot;, I hope, no one gets confused, which edit is by me and which one by someone else :-o&lt;br /&gt;
&lt;br /&gt;
Sorry.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:15, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== No exact TCG specifications needed ==&lt;br /&gt;
&lt;br /&gt;
Hello again!&lt;br /&gt;
&lt;br /&gt;
I am against writing about the specific specifications, because it will make the article longer and everybody, who is '''really''' interested in the specifications has several possibilities to get it for free in the WWW or from Cryptolabs.org or from the CCC.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:22, 4 Jul 2005 (CEST)&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6135</id>
		<title>Talk:TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6135"/>
		<updated>2005-07-04T19:39:26Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: /* No exact TCG specifications needed */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Discussion about the article &amp;quot;Trusted or Treacherous&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
Please add you comments here. &lt;br /&gt;
&lt;br /&gt;
You can use the &amp;quot;Plus&amp;quot;(+)-Button next to the &amp;quot;edit&amp;quot;-button at the top of this page to add you comments at the right spot ;-)&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 11:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Plagiarism? ==&lt;br /&gt;
&lt;br /&gt;
Large parts of this article apparently consist of unattributed, near-verbatim excerpts from a SANE2004 paper by Weis, Lucks, and Bogk, [http://www.cryptolabs.org/CCC2004TCunendlich/WeisLucksBogkSane2004tcg12.pdf TCG 1.2 - fair play with the 'Fritz' chip?]. Regardless of whether one believes that general political/ethical concerns about Trusted Computing belong on a Thinkpad-specific site, wholesale copying of unidentified, and presumably copyrighted, material is not cool, and could get the whole project in trouble.&lt;br /&gt;
&lt;br /&gt;
I would suggest that the non-original parts of this article be removed and replaced by an external link to the above-mentioned paper; any particularly crucial short excerpts (as permitted by &amp;quot;fair use&amp;quot;) should be clearly identified as such. The specific information about how the TCG specifications are implemented on various Thinkpad models can stay, of course.&lt;br /&gt;
&lt;br /&gt;
== The Source is under Creative Commons, isn't it? ==&lt;br /&gt;
&lt;br /&gt;
Hello Andrzej,&lt;br /&gt;
&lt;br /&gt;
yes, you are right, another version of this text on a website of the presentation of the annual chaos computer club is one of my sources, but I think, that one is under creative commons license by-nc-sa 2.0 de. And are the presentations of the chaos computer congress not also free unless the speakers don't want it??????&lt;br /&gt;
&lt;br /&gt;
This license allows to copy, distribute, display, perform or modify the text as long as it is published under exactly the same creative commons license and licensees may not use the work for commercial purposes - unless they get the licensor's permission.&lt;br /&gt;
&lt;br /&gt;
My problem was, I had a lot more sources in a different language than english and my first drafts were way to long!&lt;br /&gt;
&lt;br /&gt;
It didn't worked to keep it that short but detailed, as Ruediger and Adreas wrote it.&lt;br /&gt;
&lt;br /&gt;
But if you think, after my explanation the actual version is still problematic, I will delete it of course!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:12, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Thanks for your work, i like it ==&lt;br /&gt;
&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
thank you very much for editing and restructering of that article.&lt;br /&gt;
&lt;br /&gt;
I think, I know know what you and Andrzej want and I will try in he next days, to change the article in that way, okay?&lt;br /&gt;
&lt;br /&gt;
P.S.: I don't know, why I loose my logged-in status from time to time, perhaps my connection. I am sorry, that there are IP-Adresses instead of my unsername &amp;quot;pitsche&amp;quot;, I hope, no one gets confused, which edit is by me and which one by someone else :-o&lt;br /&gt;
&lt;br /&gt;
Sorry.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:15, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
If the original authors have explicitly published the text under a suitably permissive CC license, there should be no legal problem in using it in a ThinkWiki article. Even in that case, however, the source needs to be clearly identified, and there should be a link to the complete original article.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Okay Andrzej, I will work on that and tell all of you about it in the coming days, if I have enough time for it.&lt;br /&gt;
&lt;br /&gt;
Unless that, feel free to take out the critical passages of the article or modify it, if you have the time and if you want to do it.&lt;br /&gt;
&lt;br /&gt;
But there is a problem: I slightly changed the text, put two sentence together to one etc. How can I now cite the source?&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== No exact TCG specifications needed ==&lt;br /&gt;
&lt;br /&gt;
Hello again!&lt;br /&gt;
&lt;br /&gt;
I am against writing about the specific specifications, because it will make the article longer and everybody, who is '''really''' interested in the specifications has several possibilities to get it for free in the WWW or from Cryptolabs.org or from the CCC.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:22, 4 Jul 2005 (CEST)&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6134</id>
		<title>Talk:TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6134"/>
		<updated>2005-07-04T19:38:55Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: answer to Andrzej&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Discussion about the article &amp;quot;Trusted or Treacherous&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
Please add you comments here. &lt;br /&gt;
&lt;br /&gt;
You can use the &amp;quot;Plus&amp;quot;(+)-Button next to the &amp;quot;edit&amp;quot;-button at the top of this page to add you comments at the right spot ;-)&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 11:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Plagiarism? ==&lt;br /&gt;
&lt;br /&gt;
Large parts of this article apparently consist of unattributed, near-verbatim excerpts from a SANE2004 paper by Weis, Lucks, and Bogk, [http://www.cryptolabs.org/CCC2004TCunendlich/WeisLucksBogkSane2004tcg12.pdf TCG 1.2 - fair play with the 'Fritz' chip?]. Regardless of whether one believes that general political/ethical concerns about Trusted Computing belong on a Thinkpad-specific site, wholesale copying of unidentified, and presumably copyrighted, material is not cool, and could get the whole project in trouble.&lt;br /&gt;
&lt;br /&gt;
I would suggest that the non-original parts of this article be removed and replaced by an external link to the above-mentioned paper; any particularly crucial short excerpts (as permitted by &amp;quot;fair use&amp;quot;) should be clearly identified as such. The specific information about how the TCG specifications are implemented on various Thinkpad models can stay, of course.&lt;br /&gt;
&lt;br /&gt;
== The Source is under Creative Commons, isn't it? ==&lt;br /&gt;
&lt;br /&gt;
Hello Andrzej,&lt;br /&gt;
&lt;br /&gt;
yes, you are right, another version of this text on a website of the presentation of the annual chaos computer club is one of my sources, but I think, that one is under creative commons license by-nc-sa 2.0 de. And are the presentations of the chaos computer congress not also free unless the speakers don't want it??????&lt;br /&gt;
&lt;br /&gt;
This license allows to copy, distribute, display, perform or modify the text as long as it is published under exactly the same creative commons license and licensees may not use the work for commercial purposes - unless they get the licensor's permission.&lt;br /&gt;
&lt;br /&gt;
My problem was, I had a lot more sources in a different language than english and my first drafts were way to long!&lt;br /&gt;
&lt;br /&gt;
It didn't worked to keep it that short but detailed, as Ruediger and Adreas wrote it.&lt;br /&gt;
&lt;br /&gt;
But if you think, after my explanation the actual version is still problematic, I will delete it of course!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:12, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Thanks for your work, i like it ==&lt;br /&gt;
&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
thank you very much for editing and restructering of that article.&lt;br /&gt;
&lt;br /&gt;
I think, I know know what you and Andrzej want and I will try in he next days, to change the article in that way, okay?&lt;br /&gt;
&lt;br /&gt;
P.S.: I don't know, why I loose my logged-in status from time to time, perhaps my connection. I am sorry, that there are IP-Adresses instead of my unsername &amp;quot;pitsche&amp;quot;, I hope, no one gets confused, which edit is by me and which one by someone else :-o&lt;br /&gt;
&lt;br /&gt;
Sorry.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:15, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== No exact TCG specifications needed ==&lt;br /&gt;
&lt;br /&gt;
Hello again!&lt;br /&gt;
&lt;br /&gt;
I am against writing about the specific specifications, because it will make the article longer and everybody, who is '''really''' interested in the specifications has several possibilities to get it for free in the WWW or from Cryptolabs.org or from the CCC.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:22, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
If the original authors have explicitly published the text under a suitably permissive CC license, there should be no legal problem in using it in a ThinkWiki article. Even in that case, however, the source needs to be clearly identified, and there should be a link to the complete original article.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Okay Andrzej, I will work on that and tell all of you about it in the coming days, if I have enough time for it.&lt;br /&gt;
&lt;br /&gt;
Unless that, feel free to take out the critical passages of the article or modify it, if you have the time and if you want to do it.&lt;br /&gt;
&lt;br /&gt;
But there is a problem: I slightly changed the text, put two sentence together to one etc. How can I now cite the source?&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:38, 4 Jul 2005 (CEST)&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6133</id>
		<title>Talk:TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6133"/>
		<updated>2005-07-04T19:34:51Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: /* The Source is under Creative Commons, isn't it? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Discussion about the article &amp;quot;Trusted or Treacherous&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
Please add you comments here. &lt;br /&gt;
&lt;br /&gt;
You can use the &amp;quot;Plus&amp;quot;(+)-Button next to the &amp;quot;edit&amp;quot;-button at the top of this page to add you comments at the right spot ;-)&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 11:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Plagiarism? ==&lt;br /&gt;
&lt;br /&gt;
Large parts of this article apparently consist of unattributed, near-verbatim excerpts from a SANE2004 paper by Weis, Lucks, and Bogk, [http://www.cryptolabs.org/CCC2004TCunendlich/WeisLucksBogkSane2004tcg12.pdf TCG 1.2 - fair play with the 'Fritz' chip?]. Regardless of whether one believes that general political/ethical concerns about Trusted Computing belong on a Thinkpad-specific site, wholesale copying of unidentified, and presumably copyrighted, material is not cool, and could get the whole project in trouble.&lt;br /&gt;
&lt;br /&gt;
I would suggest that the non-original parts of this article be removed and replaced by an external link to the above-mentioned paper; any particularly crucial short excerpts (as permitted by &amp;quot;fair use&amp;quot;) should be clearly identified as such. The specific information about how the TCG specifications are implemented on various Thinkpad models can stay, of course.&lt;br /&gt;
&lt;br /&gt;
== The Source is under Creative Commons, isn't it? ==&lt;br /&gt;
&lt;br /&gt;
Hello Andrzej,&lt;br /&gt;
&lt;br /&gt;
yes, you are right, another version of this text on a website of the presentation of the annual chaos computer club is one of my sources, but I think, that one is under creative commons license by-nc-sa 2.0 de. And are the presentations of the chaos computer congress not also free unless the speakers don't want it??????&lt;br /&gt;
&lt;br /&gt;
This license allows to copy, distribute, display, perform or modify the text as long as it is published under exactly the same creative commons license and licensees may not use the work for commercial purposes - unless they get the licensor's permission.&lt;br /&gt;
&lt;br /&gt;
My problem was, I had a lot more sources in a different language than english and my first drafts were way to long!&lt;br /&gt;
&lt;br /&gt;
It didn't worked to keep it that short but detailed, as Ruediger and Adreas wrote it.&lt;br /&gt;
&lt;br /&gt;
But if you think, after my explanation the actual version is still problematic, I will delete it of course!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:12, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Thanks for your work, i like it ==&lt;br /&gt;
&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
thank you very much for editing and restructering of that article.&lt;br /&gt;
&lt;br /&gt;
I think, I know know what you and Andrzej want and I will try in he next days, to change the article in that way, okay?&lt;br /&gt;
&lt;br /&gt;
P.S.: I don't know, why I loose my logged-in status from time to time, perhaps my connection. I am sorry, that there are IP-Adresses instead of my unsername &amp;quot;pitsche&amp;quot;, I hope, no one gets confused, which edit is by me and which one by someone else :-o&lt;br /&gt;
&lt;br /&gt;
Sorry.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:15, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== No exact TCG specifications needed ==&lt;br /&gt;
&lt;br /&gt;
Hello again!&lt;br /&gt;
&lt;br /&gt;
I am against writing about the specific specifications, because it will make the article longer and everybody, who is '''really''' interested in the specifications has several possibilities to get it for free in the WWW or from Cryptolabs.org or from the CCC.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:22, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
If the original authors have explicitly published the text under a suitably permissive CC license, there should be no legal problem in using it in a ThinkWiki article. Even in that case, however, the source needs to be clearly identified, and there should be a link to the complete original article.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6226</id>
		<title>TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6226"/>
		<updated>2005-07-04T19:29:20Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: Questionmark added for more neutralitiy, more examples added,&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|style=&amp;quot;vertical-align:top;padding-right:20px;white-space:nowrap;&amp;quot; | __TOC__&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: 0; margin-right:10px; border: 1px solid #dfdfdf; padding: 0em 1em 1em 1em; background-color:#F8F8FF; align:right;&amp;quot;&amp;gt;The Members of the Trusted Computing Group (TCG), formerly the Trusted Computing Platform Allience (TCPA), are working on a paradigm shift in information technology, which could become the biggest change of the information landscape since decades.&lt;br /&gt;
&lt;br /&gt;
This article tries to gather information about the implications of the TCPA and TCG effords. To many users these implications seem rather treacherous than trustworthy. This article tries to give a short summarized overview over the facts from a rather netral point of view.&lt;br /&gt;
&lt;br /&gt;
We will start with a quote:&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;It is clear that trusted computing hardware provides security benefits, if software is prepared to take advantage of it. But trusted computing has been received skeptically and remains controversial. Some of the controversy is based on misconceptions, but much of it is appropriate, since trusted computing systems fundamentally alter trust relationships. Legitimate concerns about trusted computing are not limited to one area, such as consumer privacy or copyright issues.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''We have at least two serious concerns about trusted computing. First, existing designs are fundamentally flawed because they expose the public to new risks of anti-competitive and anti-consumer behavior. Second, manufacturers of particular &amp;quot;trusted&amp;quot; computers and components may secretly implement them incorrectly.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation]''&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==TC - Trusted Computing==&lt;br /&gt;
Recently, the number of known security incidents has been dramatically increasing. Thus, security issues in computer industry have been pushed forward. So far, digital content on computers couldn't be efficiently protected since every security mechanism accessible by software could always be circumvent by software.&lt;br /&gt;
&lt;br /&gt;
The idea of Trusted Computing is to provide a hardware layer that cares for&lt;br /&gt;
* storage of security related data like keys, certificates and checksums&lt;br /&gt;
* encryption and decryption&lt;br /&gt;
* validation of certificates&lt;br /&gt;
* (Remote) Platform Attestation (''meaning that somebody can check the state of your personal computer over the internet'')&lt;br /&gt;
* Sealing (''meaning binding data to a specific platform and application'')&lt;br /&gt;
&lt;br /&gt;
Since this way the hardware can handle security management without any software being able to access the security data (like a Black Box). Moreover, the whole software layer can be 'monitored' by the hardware through the use of checksums. Hence the TCPA layer can recognise changes to the software layer and block the whole system from starting, this way keeping malicious software from running at all.&lt;br /&gt;
&lt;br /&gt;
==A short history of TCPA, TCG, Palladium and NSCB:==&lt;br /&gt;
* 1999: The Trusted Computing Platform Alliance (TCPA) is founded by Intel, Microsoft, HP, Compaq and IBM. &lt;br /&gt;
* February 2002: The TCPA Main Specification Version 1.1b is being published. &lt;br /&gt;
* Early 2003: In the beginning of 2003 the name of Microsofts own TC-Projekt &amp;quot;Palladium&amp;quot; is changed to &amp;quot;next-generation secure computing base&amp;quot; (NGSCB).&lt;br /&gt;
* April 2003: The Trusted Computing Group (TCG) is founded by AMD, HP, IBM, Intel and Microsoft.&lt;br /&gt;
* Summer 2004: Microsoft seems to have stopped their &amp;quot;NGSCB&amp;quot;-effort.&lt;br /&gt;
&lt;br /&gt;
==The TCPA==&lt;br /&gt;
Founded 1999 by Compaq, HP, IBM, Intel and Microsoft, the TCPA counts around 200 members by now, among them Adobe, AMD, Fujitsu-Siemens, Gateway, Motorola, Samsung, Toshiba and many others.&lt;br /&gt;
&lt;br /&gt;
ToDo...&lt;br /&gt;
&lt;br /&gt;
==The TCG==&lt;br /&gt;
As successor of the TCPA, the TCG was founded by AMD, HP, IBM, Intel and Microsoft in April 2004.&lt;br /&gt;
&lt;br /&gt;
==TCG Hardware Architecture==&lt;br /&gt;
The Trusted Platform Module (TPM) (a.k.a. &amp;quot;Fritz&amp;quot;-Chip) is the central element of the TCG architecture. Imagine a hardwired smart card for a abstract picture of this architecture.&lt;br /&gt;
&lt;br /&gt;
The integration of the whole functionality into the CPU is also discussed, which would increase resistance against tampering attacks (see also Intel &amp;quot;LaGrande&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Regarding the hardware security of the &amp;quot;Trusted Platform Modules (TPM)&amp;quot;, there were two important critiques:&lt;br /&gt;
*The first one has been the insuficient security certification against hardware attacks. In TCG 1.2 this critique has been addressed by an improvement of the hardware requirements. It has to be seen how strong the resistance against sophisticated attacks at intensively daily usage will be.&lt;br /&gt;
*The second one addreses the 'black box'-characterisitcs and risk 'hidden channels' in the TCG-Hardware, which can be easily implemented and used to send secret information to third parties.&lt;br /&gt;
&lt;br /&gt;
==TC - Treacherous Computing?==&lt;br /&gt;
Generally, there are good arguments that these features can be used to improve the security of computer systems. Trusted Computing offers a lot of features which can be used to protect the personal computer against malicious software and users.  &lt;br /&gt;
&lt;br /&gt;
But according to a lot of technical analysis, most researchers have fundamental critics on the main design considerations. The new infrastructure will offer '''only minor protection against worms and viruses''', although TCG is telling something completely different. Furthermore, some of these features can already be established by todays smart card supported systems, so where is the need for TCG 1.1?&lt;br /&gt;
&lt;br /&gt;
''We recognize that hardware enhancements might be one way to improve computer security. But treating computer owners as adversaries is not progress in computer security. '''The interoperability, competition, owner control, and similar problems inherent in the TCG and NCSCB approach are serious enough that we recommend against adoption of these trusted computing technologies until these problems have been addressed. Fortunately, we believe these problems are not insurmountable''', and we look forward to working with the industry to resolve them.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation], bold emphasis by [[User:Pitsche|Pitsche]]&lt;br /&gt;
&lt;br /&gt;
There are a lot of drawbacks to this kind of security implementation: &lt;br /&gt;
*The concept prevents even the device owner from certain operations. &lt;br /&gt;
*Remote Attestation is a good feature to remotely detect tampering of the computer, as long as this 'somebody' is the owner of the platform. But if this Remote Attestation is used by third parties, serious privacy and market domination issues arise.&lt;br /&gt;
*There are certainly legitimate reasons for Sealing. But the main use case seems to be consumer-unfriendly new 'business cases' for content dealers which involve locking down content to a single platform, based on connecting content to a specific device without any migration options. &lt;br /&gt;
&lt;br /&gt;
Additionally, the market domination of Microsoft, obscurities regarding the needed trust infrastructure and a heap of patents have lead to critical evaluations from cryptographers, privacy organizations and European institutions. &amp;lt;br /&amp;gt;&lt;br /&gt;
Because of this pressure the Trusted Computing Group has modifed its proposal. The recent specification is &amp;quot;TCG 1.2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== DRM - Digital Rights Management ===&lt;br /&gt;
The philosophy behind Remote Platform Attestation and Sealing seems to be a protection of the computer system like a ThinkPad or electronic device like a MP3-Player ''against'' its user and owner.&lt;br /&gt;
&lt;br /&gt;
What will do this to the use of digital media content on computers or other electronic devices? The answer of the IT- and the Entertainment-Industry is &amp;quot;Digital Rights Management&amp;quot; or just shortly &amp;quot;DRM&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
''The DRM component takes control over the rest of the user's device which they rightfully own (e.g. MP3-Player'' '''or a ThinkPad)''' ''and restricts how it may act, regardless of the user's wishes (e.g. preventing the user from copying a song). All forms of DRM depend on the device imposing restrictions that cannot be legally disabled or modified by the user. In other words, the user has no choice.'' Bold emphasised by [[User:Pitsche]].&lt;br /&gt;
&lt;br /&gt;
So a new 'name' for DRM came up: '''Digital Restrictions Management''' instead of Digital Rights Management.&lt;br /&gt;
&lt;br /&gt;
Read more at [[Wikipedia:Digital rights management]].&lt;br /&gt;
&lt;br /&gt;
=== Censorship and Avoiding Whistle Blowers ===&lt;br /&gt;
The Siamese twin of Digital Restriction Management is censorship. '''The same techniques which avoid copying music songs can be used to limit the access to all kinds of documents'''. The combination of DRM and observation hardware like TCG leads to very dangerous implications.&lt;br /&gt;
&lt;br /&gt;
Giving a real world example, the Chinese government could easily block the use of all documents containing the words &amp;quot;Dalai Lama&amp;quot; on 'trusted' computer systems.&lt;br /&gt;
&lt;br /&gt;
Another application is the fight against whistle blowers. E.g. government documents about the deportation of own citizens to countries with a doubtful law system or about supporting illegal wars could be made readable for government computers only and combined with a expiration date. This might make it very dificult for the society or following generations to disclose these breaches of humanity.&lt;br /&gt;
&lt;br /&gt;
=== Summary === &lt;br /&gt;
There are still a lot of critical questions, even though TCG 1.2 contains many steps into the right direction.&lt;br /&gt;
&lt;br /&gt;
==TCPA/TCG in ThinkPads==&lt;br /&gt;
=== Embedded Security System (1.0) ===&lt;br /&gt;
&lt;br /&gt;
Embedded Security System (in IBM documents there is no use of the additive version-nummer 1.0) is using the heayvily disputed &amp;quot;TCG 1.1&amp;quot;-specification.&lt;br /&gt;
&lt;br /&gt;
''(Features etc. will soon be added here - your help, support or cooperation is very much appreciated)''&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security System 2.0 ===&lt;br /&gt;
&lt;br /&gt;
The recent TCG-specification is &amp;quot;TCG 1.2&amp;quot; and Embedded Security System 2.0 is supposed to use this newer specification.&lt;br /&gt;
&lt;br /&gt;
''(Features etc. will soon be added here - your help, support or cooperation is very much appreciated)''&lt;br /&gt;
&lt;br /&gt;
===ThinkPads with TCPA Technology===&lt;br /&gt;
====IBM Embedded Security Subsystem====&lt;br /&gt;
*ThinkPad {{R31}}&lt;br /&gt;
*ThinkPad {{T23}}, {{T30}}&lt;br /&gt;
*ThinkPad {{X23}}, {{X24}}&lt;br /&gt;
====IBM Embedded Security Subsystem 2.0====&lt;br /&gt;
*ThinkPad {{R32}}, {{R40}}, {{R50}}, {{R50p}}, {{R51}}, {{R52}}&lt;br /&gt;
*ThinkPad {{T40}}, {{T40p}}, {{T41}}, {{T41p}}, {{T42}}, {{T42p}}, {{T43}}, {{T43p}}&lt;br /&gt;
*ThinkPad {{X30}}, {{X31}}, {{X32}}, {{X40}}, {{X41}}, {{X41T}}&lt;br /&gt;
&lt;br /&gt;
===TCPA/TCG clean models===&lt;br /&gt;
*all models produced before 2000&lt;br /&gt;
*all i Series models&lt;br /&gt;
*ThinkPad [[:Category:240X|240X]]&lt;br /&gt;
*ThinkPad [[:Category:A20m|A20m]], [[:Category:A20p|A20p]], [[:Category:A21e|A21e]], [[:Category:A21m|A21m]], [[:Category:A21p|A21p]], [[:Category:A22e|A22e]], [[:Category:A22m|A22m]], [[:Category:A22p|A22p]], [[:Category:A30|A30]]&lt;br /&gt;
*ThinkPad [[:Category:T20|T20]], [[:Category:T21|T21]]&lt;br /&gt;
*ThinkPad [[:Category:X20|X20]], [[:Category:X21|X21]], [[:Category:X22|X22]]&lt;br /&gt;
*ThinkPad [[:Category:TransNote|TransNote]]&lt;br /&gt;
&lt;br /&gt;
== OpenSource Software and TCG == &lt;br /&gt;
TCG has huge implication for the development of free software. Following a possibly expensive evaluation there will be a signature for one program version. Even if the program is licensed under the GPL every change to the code will make the signature invalid. This seems to be a strong violation of the main philosophy of OpenSource software.&lt;br /&gt;
&lt;br /&gt;
Since Microsoft controls an overwhelming part of the OS market, it seems to be rather difficult to evaluate the TCG proposal separated from the Palladium project.&lt;br /&gt;
&lt;br /&gt;
TCG versus GPL: At least two companies are researching on &amp;quot;TCG-enhanced&amp;quot; versions of GNU/Linux. According most security researchers it seems to be necessary to evaluate programs which have access to the 'trusted part'. &lt;br /&gt;
&lt;br /&gt;
== Related Links ==&lt;br /&gt;
*[http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html 'Trusted Computing' Frequently Asked Questions] - Anti-TC FAQ by Cambridge University security director and professor [[Ross Anderson]].&lt;br /&gt;
*[http://www.againsttcpa.com/ Against-TCPA]&lt;br /&gt;
*[http://invisiblog.com/1c801df4aee49232/article/0df117d5d9b32aea8bc23194ecc270ec Interesting Uses of Trusted Computing]&lt;br /&gt;
*[http://www.gnu.org/philosophy/can-you-trust.html Can you trust your computer?] essay by the FSF&lt;br /&gt;
*[http://www.protectprivacy.org/topic--lang-en.html The civil rights organisation Protect Privacy]&lt;br /&gt;
&lt;br /&gt;
== Read more at Wikipedia, the free encyclopedia: ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_computing Trusted Computing]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_Computing_Platform_Alliance Trusted Computing Group (formerly known as TCPA)]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Fritz-chip Fritz-Chip]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Palladium_operating_system Palladium]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Cryptography Wikipedia-Category: Cryptography]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Copyright_law Wikipedia-Category: Copyright Law]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Digital_rights_management Wikipedia-Category: Digital Rights Management]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Notes from the original artical that didn't fit so far&lt;br /&gt;
You own a ThinkPad build after the year 2000? Or you want to buy a brandnew ThinkPad from Levono (IBM)? Do you want to know, what the Embedded Security Subsystem is doing (or can do) in your ThinkPad? &lt;br /&gt;
&lt;br /&gt;
If you answer one or all of these questions with yes, read on :-) This is about Trusted Computing, TCPA, Palladium, the &amp;quot;Fritz&amp;quot;-Chip, Digital Rights Management and your freedom of choice. At the end of this article you find related hyperlinks to this important topic for computer users.&lt;br /&gt;
&lt;br /&gt;
Compared to this, positive features like a more secure hardware storage for cryptographic keys seem to be a very small benefit.&lt;br /&gt;
&lt;br /&gt;
:Compared with the TCPA the TCG is less democratic organized and the high membership fees obstruct the possibilities for small companies and non profit organizations to participate.&lt;br /&gt;
&lt;br /&gt;
* Microsofts own concept for 'Trustworthy Computing', &amp;quot;Palladium&amp;quot;, is expected to cost some hundreds of million cash.&lt;br /&gt;
&lt;br /&gt;
What is all the name changing about? &amp;lt;br /&amp;gt;&lt;br /&gt;
Some say, that the change was a reaction to the negative publicity, because Palladium and TCPA was soon equated with a 'Nineteen Eighty-Four'-Scenario of an 'Orwellian society', the ever-present, all-seeing 'Big Brother' and other privacy issues.&lt;br /&gt;
&lt;br /&gt;
'''This means e.g. if the user wants to use his music to a portable player he should be forced to buy another license. It seems to be doubtful, if customers will enjoy this limitations.'''&lt;br /&gt;
&lt;br /&gt;
In any case the possible problems of giving away control of the personal hardware should be evaluated carefully.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6130</id>
		<title>TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6130"/>
		<updated>2005-07-04T19:23:02Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: no TCG-Specifications needed, too complicated and too detailed&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|style=&amp;quot;vertical-align:top;padding-right:20px;white-space:nowrap;&amp;quot; | __TOC__&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: 0; margin-right:10px; border: 1px solid #dfdfdf; padding: 0em 1em 1em 1em; background-color:#F8F8FF; align:right;&amp;quot;&amp;gt;The Members of the Trusted Computing Group (TCG), formerly the Trusted Computing Platform Allience (TCPA), are working on a paradigm shift in information technology, which could become the biggest change of the information landscape since decades.&lt;br /&gt;
&lt;br /&gt;
This article tries to gather information about the implications of the TCPA and TCG effords. To many users these implications seem rather treacherous than trustworthy. This article tries to give a short summarized overview over the facts from a rather netral point of view.&lt;br /&gt;
&lt;br /&gt;
We will start with a quote:&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;It is clear that trusted computing hardware provides security benefits, if software is prepared to take advantage of it. But trusted computing has been received skeptically and remains controversial. Some of the controversy is based on misconceptions, but much of it is appropriate, since trusted computing systems fundamentally alter trust relationships. Legitimate concerns about trusted computing are not limited to one area, such as consumer privacy or copyright issues.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''We have at least two serious concerns about trusted computing. First, existing designs are fundamentally flawed because they expose the public to new risks of anti-competitive and anti-consumer behavior. Second, manufacturers of particular &amp;quot;trusted&amp;quot; computers and components may secretly implement them incorrectly.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation]''&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==TC - Trusted Computing==&lt;br /&gt;
Recently, the number of known security incidents has been dramatically increasing. Thus, security issues in computer industry have been pushed forward. So far, digital content on computers couldn't be efficiently protected since every security mechanism accessible by software could always be circumvent by software.&lt;br /&gt;
&lt;br /&gt;
The idea of Trusted Computing is to provide a hardware layer that cares for&lt;br /&gt;
* storage of security related data like keys, certificates and checksums&lt;br /&gt;
* encryption and decryption&lt;br /&gt;
* validation of certificates&lt;br /&gt;
* (Remote) Platform Attestation (''meaning that somebody can check the state of your personal computer over the internet'')&lt;br /&gt;
* Sealing (''meaning binding data to a specific platform and application'')&lt;br /&gt;
&lt;br /&gt;
Since this way the hardware can handle security management without any software being able to access the security data (like a Black Box). Moreover, the whole software layer can be 'monitored' by the hardware through the use of checksums. Hence the TCPA layer can recognise changes to the software layer and block the whole system from starting, this way keeping malicious software from running at all.&lt;br /&gt;
&lt;br /&gt;
==A short history of TCPA, TCG, Palladium and NSCB:==&lt;br /&gt;
* 1999: The Trusted Computing Platform Alliance (TCPA) is founded by Intel, Microsoft, HP, Compaq and IBM. &lt;br /&gt;
* February 2002: The TCPA Main Specification Version 1.1b is being published. &lt;br /&gt;
* Early 2003: In the beginning of 2003 the name of Microsofts own TC-Projekt &amp;quot;Palladium&amp;quot; is changed to &amp;quot;next-generation secure computing base&amp;quot; (NGSCB).&lt;br /&gt;
* April 2003: The Trusted Computing Group (TCG) is founded by AMD, HP, IBM, Intel and Microsoft.&lt;br /&gt;
* Summer 2004: Microsoft seems to have stopped their &amp;quot;NGSCB&amp;quot;-effort.&lt;br /&gt;
&lt;br /&gt;
==The TCPA==&lt;br /&gt;
Founded 1999 by Compaq, HP, IBM, Intel and Microsoft, the TCPA counts around 200 members by now, among them Adobe, AMD, Fujitsu-Siemens, Gateway, Motorola, Samsung, Toshiba and many others.&lt;br /&gt;
&lt;br /&gt;
ToDo...&lt;br /&gt;
&lt;br /&gt;
==The TCG==&lt;br /&gt;
As successor of the TCPA, the TCG was founded by AMD, HP, IBM, Intel and Microsoft in April 2004.&lt;br /&gt;
&lt;br /&gt;
==TCG Hardware Architecture==&lt;br /&gt;
The Trusted Platform Module (TPM) (a.k.a. &amp;quot;Fritz&amp;quot;-Chip) is the central element of the TCG architecture. Imagine a hardwired smart card for a abstract picture of this architecture.&lt;br /&gt;
&lt;br /&gt;
The integration of the whole functionality into the CPU is also discussed, which would increase resistance against tampering attacks (see also Intel &amp;quot;LaGrande&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Regarding the hardware security of the &amp;quot;Trusted Platform Modules (TPM)&amp;quot;, there were two important critiques:&lt;br /&gt;
*The first one has been the insuficient security certification against hardware attacks. In TCG 1.2 this critique has been addressed by an improvement of the hardware requirements. It has to be seen how strong the resistance against sophisticated attacks at intensively daily usage will be.&lt;br /&gt;
*The second one addreses the 'black box'-characterisitcs and risk 'hidden channels' in the TCG-Hardware, which can be easily implemented and used to send secret information to third parties.&lt;br /&gt;
&lt;br /&gt;
==TC - Treacherous Computing==&lt;br /&gt;
Generally, there are good arguments that these features can be used to improve the security of computer systems. Trusted Computing offers a lot of features which can be used to protect the personal computer against malicious software and users.  &lt;br /&gt;
&lt;br /&gt;
But according to a lot of technical analysis most researchers have fundamental critics on the main design considerations. The new infrastructure will offer '''only minor protection against worms and viruses'''. And some of these features can already be established by todays smart card supported systems.&lt;br /&gt;
&lt;br /&gt;
''We recognize that hardware enhancements might be one way to improve computer security. But treating computer owners as adversaries is not progress in computer security. '''The interoperability, competition, owner control, and similar problems inherent in the TCG and NCSCB approach are serious enough that we recommend against adoption of these trusted computing technologies until these problems have been addressed. Fortunately, we believe these problems are not insurmountable''', and we look forward to working with the industry to resolve them.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation], bold emphasis by [[User:Pitsche|Pitsche]]&lt;br /&gt;
&lt;br /&gt;
There are a lot of drawbacks to this kind of security implementation...&lt;br /&gt;
*The concept prevents even the device owner from certain operations. &lt;br /&gt;
*Remote Attestation is a good feature to remotely detect tampering of the computer, as long as this 'somebody' is the owner of the platform. But if this Remote Attestation is used by third parties, serious privacy and market domination issues arise.&lt;br /&gt;
*There are certainly legitimate reasons for Sealing. But the main use case seems to be consumer-unfriendly new 'business cases' for content dealers which involve locking down content to a single platform, based on connecting content to a specific device without any migration options. &lt;br /&gt;
&lt;br /&gt;
Additionally, the market domination of Microsoft, obscurities regarding the needed trust infrastructure and a heap of patents have lead to critical evaluations from cryptographers, privacy organizations and European institutions. &amp;lt;br /&amp;gt;&lt;br /&gt;
Because of this pressure the Trusted Computing Group has modifed its proposal. The recent specification is &amp;quot;TCG 1.2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== DRM - Digital Rights Management ===&lt;br /&gt;
The philosophy behind Remote Platform Attestation and Sealing seems to be a protection of the computer system or electronic device ''against'' its user and owner.&lt;br /&gt;
&lt;br /&gt;
What will do this to the use of digital media content on electronic devices? The answer of the IT- and the Entertainment-Industry is &amp;quot;Digital Rights Management&amp;quot; or just shortly &amp;quot;DRM&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
''The DRM component takes control over the rest of the user's device which they rightfully own (e.g. MP3-Player'' '''or a ThinkPad)''' ''and restricts how it may act, regardless of the user's wishes (e.g. preventing the user from copying a song). All forms of DRM depend on the device imposing restrictions that cannot be legally disabled or modified by the user. In other words, the user has no choice.'' Bold emphasised by [[User:Pitsche]].&lt;br /&gt;
&lt;br /&gt;
So a new 'name' for DRM came up: '''Digital Restrictions Management''' instead of Digital Rights Management.&lt;br /&gt;
&lt;br /&gt;
Read more at [[Wikipedia:Digital rights management]].&lt;br /&gt;
&lt;br /&gt;
=== Censorship and Avoiding Whistle Blowers ===&lt;br /&gt;
The Siamese twin of Digital Restriction Management is censorship. '''The same techniques which avoid copying music songs can be used to limit the access to all kinds of documents'''. The combination of DRM and observation hardware like TCG leads to very dangerous implications.&lt;br /&gt;
&lt;br /&gt;
Giving a real world example, the Chinese government could easily block the use of all documents containing the words &amp;quot;Dalai Lama&amp;quot; on 'trusted' computer systems.&lt;br /&gt;
&lt;br /&gt;
Another application is the fight against whistle blowers. E.g. government documents about the deportation of own citizens to countries with a doubtful law system or about supporting illegal wars could be made readable for government computers only and combined with a expiration date. This might make it very dificult for the society or following generations to disclose these breaches of humanity.&lt;br /&gt;
&lt;br /&gt;
=== Summary === &lt;br /&gt;
There are still a lot of critical questions, even though TCG 1.2 contains many steps into the right direction.&lt;br /&gt;
&lt;br /&gt;
==TCPA/TCG in ThinkPads==&lt;br /&gt;
=== Embedded Security System (1.0) ===&lt;br /&gt;
&lt;br /&gt;
Embedded Security System (in IBM documents there is no use of the additive version-nummer 1.0) is using the heayvily disputed &amp;quot;TCG 1.1&amp;quot;-specification.&lt;br /&gt;
&lt;br /&gt;
''(Features etc. will soon be added here - your help, support or cooperation is very much appreciated)''&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security System 2.0 ===&lt;br /&gt;
&lt;br /&gt;
The recent TCG-specification is &amp;quot;TCG 1.2&amp;quot; and Embedded Security System 2.0 is supposed to use this newer specification.&lt;br /&gt;
&lt;br /&gt;
''(Features etc. will soon be added here - your help, support or cooperation is very much appreciated)''&lt;br /&gt;
&lt;br /&gt;
===ThinkPads with TCPA Technology===&lt;br /&gt;
====IBM Embedded Security Subsystem====&lt;br /&gt;
*ThinkPad {{R31}}&lt;br /&gt;
*ThinkPad {{T23}}, {{T30}}&lt;br /&gt;
*ThinkPad {{X23}}, {{X24}}&lt;br /&gt;
====IBM Embedded Security Subsystem 2.0====&lt;br /&gt;
*ThinkPad {{R32}}, {{R40}}, {{R50}}, {{R50p}}, {{R51}}, {{R52}}&lt;br /&gt;
*ThinkPad {{T40}}, {{T40p}}, {{T41}}, {{T41p}}, {{T42}}, {{T42p}}, {{T43}}, {{T43p}}&lt;br /&gt;
*ThinkPad {{X30}}, {{X31}}, {{X32}}, {{X40}}, {{X41}}, {{X41T}}&lt;br /&gt;
&lt;br /&gt;
===TCPA/TCG clean models===&lt;br /&gt;
*all models produced before 2000&lt;br /&gt;
*all i Series models&lt;br /&gt;
*ThinkPad [[:Category:240X|240X]]&lt;br /&gt;
*ThinkPad [[:Category:A20m|A20m]], [[:Category:A20p|A20p]], [[:Category:A21e|A21e]], [[:Category:A21m|A21m]], [[:Category:A21p|A21p]], [[:Category:A22e|A22e]], [[:Category:A22m|A22m]], [[:Category:A22p|A22p]], [[:Category:A30|A30]]&lt;br /&gt;
*ThinkPad [[:Category:T20|T20]], [[:Category:T21|T21]]&lt;br /&gt;
*ThinkPad [[:Category:X20|X20]], [[:Category:X21|X21]], [[:Category:X22|X22]]&lt;br /&gt;
*ThinkPad [[:Category:TransNote|TransNote]]&lt;br /&gt;
&lt;br /&gt;
== OpenSource Software and TCG == &lt;br /&gt;
TCG has huge implication for the development of free software. Following a possibly expensive evaluation there will be a signature for one program version. Even if the program is licensed under the GPL every change to the code will make the signature invalid. This seems to be a strong violation of the main philosophy of OpenSource software.&lt;br /&gt;
&lt;br /&gt;
Since Microsoft controls an overwhelming part of the OS market, it seems to be rather difficult to evaluate the TCG proposal separated from the Palladium project.&lt;br /&gt;
&lt;br /&gt;
TCG versus GPL: At least two companies are researching on &amp;quot;TCG-enhanced&amp;quot; versions of GNU/Linux. According most security researchers it seems to be necessary to evaluate programs which have access to the 'trusted part'. &lt;br /&gt;
&lt;br /&gt;
== Related Links ==&lt;br /&gt;
*[http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html 'Trusted Computing' Frequently Asked Questions] - Anti-TC FAQ by Cambridge University security director and professor [[Ross Anderson]].&lt;br /&gt;
*[http://www.againsttcpa.com/ Against-TCPA]&lt;br /&gt;
*[http://invisiblog.com/1c801df4aee49232/article/0df117d5d9b32aea8bc23194ecc270ec Interesting Uses of Trusted Computing]&lt;br /&gt;
*[http://www.gnu.org/philosophy/can-you-trust.html Can you trust your computer?] essay by the FSF&lt;br /&gt;
*[http://www.protectprivacy.org/topic--lang-en.html The civil rights organisation Protect Privacy]&lt;br /&gt;
&lt;br /&gt;
== Read more at Wikipedia, the free encyclopedia: ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_computing Trusted Computing]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_Computing_Platform_Alliance Trusted Computing Group (formerly known as TCPA)]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Fritz-chip Fritz-Chip]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Palladium_operating_system Palladium]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Cryptography Wikipedia-Category: Cryptography]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Copyright_law Wikipedia-Category: Copyright Law]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Digital_rights_management Wikipedia-Category: Digital Rights Management]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Notes from the original artical that didn't fit so far&lt;br /&gt;
You own a ThinkPad build after the year 2000? Or you want to buy a brandnew ThinkPad from Levono (IBM)? Do you want to know, what the Embedded Security Subsystem is doing (or can do) in your ThinkPad? &lt;br /&gt;
&lt;br /&gt;
If you answer one or all of these questions with yes, read on :-) This is about Trusted Computing, TCPA, Palladium, the &amp;quot;Fritz&amp;quot;-Chip, Digital Rights Management and your freedom of choice. At the end of this article you find related hyperlinks to this important topic for computer users.&lt;br /&gt;
&lt;br /&gt;
Compared to this, positive features like a more secure hardware storage for cryptographic keys seem to be a very small benefit.&lt;br /&gt;
&lt;br /&gt;
:Compared with the TCPA the TCG is less democratic organized and the high membership fees obstruct the possibilities for small companies and non profit organizations to participate.&lt;br /&gt;
&lt;br /&gt;
* Microsofts own concept for 'Trustworthy Computing', &amp;quot;Palladium&amp;quot;, is expected to cost some hundreds of million cash.&lt;br /&gt;
&lt;br /&gt;
What is all the name changing about? &amp;lt;br /&amp;gt;&lt;br /&gt;
Some say, that the change was a reaction to the negative publicity, because Palladium and TCPA was soon equated with a 'Nineteen Eighty-Four'-Scenario of an 'Orwellian society', the ever-present, all-seeing 'Big Brother' and other privacy issues.&lt;br /&gt;
&lt;br /&gt;
'''This means e.g. if the user wants to use his music to a portable player he should be forced to buy another license. It seems to be doubtful, if customers will enjoy this limitations.'''&lt;br /&gt;
&lt;br /&gt;
In any case the possible problems of giving away control of the personal hardware should be evaluated carefully.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6128</id>
		<title>Talk:TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6128"/>
		<updated>2005-07-04T19:22:12Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: No exact TCG specifications needed&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Discussion about the article &amp;quot;Trusted or Treacherous&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
Please add you comments here. &lt;br /&gt;
&lt;br /&gt;
You can use the &amp;quot;Plus&amp;quot;(+)-Button next to the &amp;quot;edit&amp;quot;-button at the top of this page to add you comments at the right spot ;-)&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 11:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Plagiarism? ==&lt;br /&gt;
&lt;br /&gt;
Large parts of this article apparently consist of unattributed, near-verbatim excerpts from a SANE2004 paper by Weis, Lucks, and Bogk, [http://www.cryptolabs.org/CCC2004TCunendlich/WeisLucksBogkSane2004tcg12.pdf TCG 1.2 - fair play with the 'Fritz' chip?]. Regardless of whether one believes that general political/ethical concerns about Trusted Computing belong on a Thinkpad-specific site, wholesale copying of unidentified, and presumably copyrighted, material is not cool, and could get the whole project in trouble.&lt;br /&gt;
&lt;br /&gt;
I would suggest that the non-original parts of this article be removed and replaced by an external link to the above-mentioned paper; any particularly crucial short excerpts (as permitted by &amp;quot;fair use&amp;quot;) should be clearly identified as such. The specific information about how the TCG specifications are implemented on various Thinkpad models can stay, of course.&lt;br /&gt;
&lt;br /&gt;
== The Source is under Creative Commons, isn't it? ==&lt;br /&gt;
&lt;br /&gt;
Hello Andrzej,&lt;br /&gt;
&lt;br /&gt;
yes, you are right, this text on a website of the presentation of the annual chaos computer club is one of my sources, but I think, it is under creative commons license by-nc-sa 2.0 de. And are the presentations of the chaos computer congress not also free unless the speakers don't want it??????&lt;br /&gt;
&lt;br /&gt;
This license allows to copy, distribute, display, perform or modify the text as long as it is published under exactly the same creative commons license and licensees may not use the work for commercial purposes - unless they get the licensor's permission.&lt;br /&gt;
&lt;br /&gt;
My problem was, I had a lot more sources in a different language than english and my first drafts were way to long!&lt;br /&gt;
&lt;br /&gt;
It didn't worked to keep it that short but detailed, as Ruediger and Adreas wrote it.&lt;br /&gt;
&lt;br /&gt;
But if you think, after my explanation the actual version is still problematic, I will delete it of course!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:12, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Thanks for your work, i like it ==&lt;br /&gt;
&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
thank you very much for editing and restructering of that article.&lt;br /&gt;
&lt;br /&gt;
I think, I know know what you and Andrzej want and I will try in he next days, to change the article in that way, okay?&lt;br /&gt;
&lt;br /&gt;
P.S.: I don't know, why I loose my logged-in status from time to time, perhaps my connection. I am sorry, that there are IP-Adresses instead of my unsername &amp;quot;pitsche&amp;quot;, I hope, no one gets confused, which edit is by me and which one by someone else :-o&lt;br /&gt;
&lt;br /&gt;
Sorry.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:15, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== No exact TCG specifications needed ==&lt;br /&gt;
&lt;br /&gt;
Hello again!&lt;br /&gt;
&lt;br /&gt;
I am against writing about the specific specifications, because it will make the article longer and everybody, who is '''really''' interested in the specifications has several possibilities to get it for free in the WWW or from Cryptolabs.org or from the CCC.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:22, 4 Jul 2005 (CEST)&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6127</id>
		<title>TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6127"/>
		<updated>2005-07-04T19:19:31Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: Palladium was changed to NGSCB, not TCPA or TCG ;-)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|style=&amp;quot;vertical-align:top;padding-right:20px;white-space:nowrap;&amp;quot; | __TOC__&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: 0; margin-right:10px; border: 1px solid #dfdfdf; padding: 0em 1em 1em 1em; background-color:#F8F8FF; align:right;&amp;quot;&amp;gt;The Members of the Trusted Computing Group (TCG), formerly the Trusted Computing Platform Allience (TCPA), are working on a paradigm shift in information technology, which could become the biggest change of the information landscape since decades.&lt;br /&gt;
&lt;br /&gt;
This article tries to gather information about the implications of the TCPA and TCG effords. To many users these implications seem rather treacherous than trustworthy. This article tries to give a short summarized overview over the facts from a rather netral point of view.&lt;br /&gt;
&lt;br /&gt;
We will start with a quote:&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;It is clear that trusted computing hardware provides security benefits, if software is prepared to take advantage of it. But trusted computing has been received skeptically and remains controversial. Some of the controversy is based on misconceptions, but much of it is appropriate, since trusted computing systems fundamentally alter trust relationships. Legitimate concerns about trusted computing are not limited to one area, such as consumer privacy or copyright issues.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''We have at least two serious concerns about trusted computing. First, existing designs are fundamentally flawed because they expose the public to new risks of anti-competitive and anti-consumer behavior. Second, manufacturers of particular &amp;quot;trusted&amp;quot; computers and components may secretly implement them incorrectly.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation]''&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==TC - Trusted Computing==&lt;br /&gt;
Recently, the number of known security incidents has been dramatically increasing. Thus, security issues in computer industry have been pushed forward. So far, digital content on computers couldn't be efficiently protected since every security mechanism accessible by software could always be circumvent by software.&lt;br /&gt;
&lt;br /&gt;
The idea of Trusted Computing is to provide a hardware layer that cares for&lt;br /&gt;
* storage of security related data like keys, certificates and checksums&lt;br /&gt;
* encryption and decryption&lt;br /&gt;
* validation of certificates&lt;br /&gt;
* (Remote) Platform Attestation (''meaning that somebody can check the state of your personal computer over the internet'')&lt;br /&gt;
* Sealing (''meaning binding data to a specific platform and application'')&lt;br /&gt;
&lt;br /&gt;
Since this way the hardware can handle security management without any software being able to access the security data (like a Black Box). Moreover, the whole software layer can be 'monitored' by the hardware through the use of checksums. Hence the TCPA layer can recognise changes to the software layer and block the whole system from starting, this way keeping malicious software from running at all.&lt;br /&gt;
&lt;br /&gt;
==A short history of TCPA, TCG, Palladium and NSCB:==&lt;br /&gt;
* 1999: The Trusted Computing Platform Alliance (TCPA) is founded by Intel, Microsoft, HP, Compaq and IBM. &lt;br /&gt;
* February 2002: The TCPA Main Specification Version 1.1b is being published. &lt;br /&gt;
* Early 2003: In the beginning of 2003 the name of Microsofts own TC-Projekt &amp;quot;Palladium&amp;quot; is changed to &amp;quot;next-generation secure computing base&amp;quot; (NGSCB).&lt;br /&gt;
* April 2003: The Trusted Computing Group (TCG) is founded by AMD, HP, IBM, Intel and Microsoft.&lt;br /&gt;
* Summer 2004: Microsoft seems to have stopped their &amp;quot;NGSCB&amp;quot;-effort.&lt;br /&gt;
&lt;br /&gt;
==The TCPA==&lt;br /&gt;
Founded 1999 by Compaq, HP, IBM, Intel and Microsoft, the TCPA counts around 200 members by now, among them Adobe, AMD, Fujitsu-Siemens, Gateway, Motorola, Samsung, Toshiba and many others.&lt;br /&gt;
&lt;br /&gt;
ToDo...&lt;br /&gt;
&lt;br /&gt;
==The TCG==&lt;br /&gt;
As successor of the TCPA, the TCG was founded by AMD, HP, IBM, Intel and Microsoft in April 2004.&lt;br /&gt;
&lt;br /&gt;
ToDo...&lt;br /&gt;
&lt;br /&gt;
===TCG 1.1===&lt;br /&gt;
ToDo...&lt;br /&gt;
&lt;br /&gt;
===TCG 1.2===&lt;br /&gt;
ToDo...&lt;br /&gt;
&lt;br /&gt;
==TCG Hardware Architecture==&lt;br /&gt;
The Trusted Platform Module (TPM) (a.k.a. &amp;quot;Fritz&amp;quot;-Chip) is the central element of the TCG architecture. Imagine a hardwired smart card for a abstract picture of this architecture.&lt;br /&gt;
&lt;br /&gt;
The integration of the whole functionality into the CPU is also discussed, which would increase resistance against tampering attacks (see also Intel &amp;quot;LaGrande&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Regarding the hardware security of the &amp;quot;Trusted Platform Modules (TPM)&amp;quot;, there were two important critiques:&lt;br /&gt;
*The first one has been the insuficient security certification against hardware attacks. In TCG 1.2 this critique has been addressed by an improvement of the hardware requirements. It has to be seen how strong the resistance against sophisticated attacks at intensively daily usage will be.&lt;br /&gt;
*The second one addreses the 'black box'-characterisitcs and risk 'hidden channels' in the TCG-Hardware, which can be easily implemented and used to send secret information to third parties.&lt;br /&gt;
&lt;br /&gt;
==TC - Treacherous Computing==&lt;br /&gt;
Generally, there are good arguments that these features can be used to improve the security of computer systems. Trusted Computing offers a lot of features which can be used to protect the personal computer against malicious software and users.  &lt;br /&gt;
&lt;br /&gt;
But according to a lot of technical analysis most researchers have fundamental critics on the main design considerations. The new infrastructure will offer '''only minor protection against worms and viruses'''. And some of these features can already be established by todays smart card supported systems.&lt;br /&gt;
&lt;br /&gt;
''We recognize that hardware enhancements might be one way to improve computer security. But treating computer owners as adversaries is not progress in computer security. '''The interoperability, competition, owner control, and similar problems inherent in the TCG and NCSCB approach are serious enough that we recommend against adoption of these trusted computing technologies until these problems have been addressed. Fortunately, we believe these problems are not insurmountable''', and we look forward to working with the industry to resolve them.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation], bold emphasis by [[User:Pitsche|Pitsche]]&lt;br /&gt;
&lt;br /&gt;
There are a lot of drawbacks to this kind of security implementation...&lt;br /&gt;
*The concept prevents even the device owner from certain operations. &lt;br /&gt;
*Remote Attestation is a good feature to remotely detect tampering of the computer, as long as this 'somebody' is the owner of the platform. But if this Remote Attestation is used by third parties, serious privacy and market domination issues arise.&lt;br /&gt;
*There are certainly legitimate reasons for Sealing. But the main use case seems to be consumer-unfriendly new 'business cases' for content dealers which involve locking down content to a single platform, based on connecting content to a specific device without any migration options. &lt;br /&gt;
&lt;br /&gt;
Additionally, the market domination of Microsoft, obscurities regarding the needed trust infrastructure and a heap of patents have lead to critical evaluations from cryptographers, privacy organizations and European institutions. &amp;lt;br /&amp;gt;&lt;br /&gt;
Because of this pressure the Trusted Computing Group has modifed its proposal. The recent specification is &amp;quot;TCG 1.2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== DRM - Digital Rights Management ===&lt;br /&gt;
The philosophy behind Remote Platform Attestation and Sealing seems to be a protection of the computer system or electronic device ''against'' its user and owner.&lt;br /&gt;
&lt;br /&gt;
What will do this to the use of digital media content on electronic devices? The answer of the IT- and the Entertainment-Industry is &amp;quot;Digital Rights Management&amp;quot; or just shortly &amp;quot;DRM&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
''The DRM component takes control over the rest of the user's device which they rightfully own (e.g. MP3-Player'' '''or a ThinkPad)''' ''and restricts how it may act, regardless of the user's wishes (e.g. preventing the user from copying a song). All forms of DRM depend on the device imposing restrictions that cannot be legally disabled or modified by the user. In other words, the user has no choice.'' Bold emphasised by [[User:Pitsche]].&lt;br /&gt;
&lt;br /&gt;
So a new 'name' for DRM came up: '''Digital Restrictions Management''' instead of Digital Rights Management.&lt;br /&gt;
&lt;br /&gt;
Read more at [[Wikipedia:Digital rights management]].&lt;br /&gt;
&lt;br /&gt;
=== Censorship and Avoiding Whistle Blowers ===&lt;br /&gt;
The Siamese twin of Digital Restriction Management is censorship. '''The same techniques which avoid copying music songs can be used to limit the access to all kinds of documents'''. The combination of DRM and observation hardware like TCG leads to very dangerous implications.&lt;br /&gt;
&lt;br /&gt;
Giving a real world example, the Chinese government could easily block the use of all documents containing the words &amp;quot;Dalai Lama&amp;quot; on 'trusted' computer systems.&lt;br /&gt;
&lt;br /&gt;
Another application is the fight against whistle blowers. E.g. government documents about the deportation of own citizens to countries with a doubtful law system or about supporting illegal wars could be made readable for government computers only and combined with a expiration date. This might make it very dificult for the society or following generations to disclose these breaches of humanity.&lt;br /&gt;
&lt;br /&gt;
=== Summary === &lt;br /&gt;
There are still a lot of critical questions, even though TCG 1.2 contains many steps into the right direction.&lt;br /&gt;
&lt;br /&gt;
==TCPA/TCG in ThinkPads==&lt;br /&gt;
=== Embedded Security System (1.0) ===&lt;br /&gt;
&lt;br /&gt;
Embedded Security System (in IBM documents there is no use of the additive version-nummer 1.0) is using the heayvily disputed &amp;quot;TCG 1.1&amp;quot;-specification.&lt;br /&gt;
&lt;br /&gt;
''(Features etc. will soon be added here - your help, support or cooperation is very much appreciated)''&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security System 2.0 ===&lt;br /&gt;
&lt;br /&gt;
The recent TCG-specification is &amp;quot;TCG 1.2&amp;quot; and Embedded Security System 2.0 is supposed to use this newer specification.&lt;br /&gt;
&lt;br /&gt;
''(Features etc. will soon be added here - your help, support or cooperation is very much appreciated)''&lt;br /&gt;
&lt;br /&gt;
===ThinkPads with TCPA Technology===&lt;br /&gt;
====IBM Embedded Security Subsystem====&lt;br /&gt;
*ThinkPad {{R31}}&lt;br /&gt;
*ThinkPad {{T23}}, {{T30}}&lt;br /&gt;
*ThinkPad {{X23}}, {{X24}}&lt;br /&gt;
====IBM Embedded Security Subsystem 2.0====&lt;br /&gt;
*ThinkPad {{R32}}, {{R40}}, {{R50}}, {{R50p}}, {{R51}}, {{R52}}&lt;br /&gt;
*ThinkPad {{T40}}, {{T40p}}, {{T41}}, {{T41p}}, {{T42}}, {{T42p}}, {{T43}}, {{T43p}}&lt;br /&gt;
*ThinkPad {{X30}}, {{X31}}, {{X32}}, {{X40}}, {{X41}}, {{X41T}}&lt;br /&gt;
&lt;br /&gt;
===TCPA/TCG clean models===&lt;br /&gt;
*all models produced before 2000&lt;br /&gt;
*all i Series models&lt;br /&gt;
*ThinkPad [[:Category:240X|240X]]&lt;br /&gt;
*ThinkPad [[:Category:A20m|A20m]], [[:Category:A20p|A20p]], [[:Category:A21e|A21e]], [[:Category:A21m|A21m]], [[:Category:A21p|A21p]], [[:Category:A22e|A22e]], [[:Category:A22m|A22m]], [[:Category:A22p|A22p]], [[:Category:A30|A30]]&lt;br /&gt;
*ThinkPad [[:Category:T20|T20]], [[:Category:T21|T21]]&lt;br /&gt;
*ThinkPad [[:Category:X20|X20]], [[:Category:X21|X21]], [[:Category:X22|X22]]&lt;br /&gt;
*ThinkPad [[:Category:TransNote|TransNote]]&lt;br /&gt;
&lt;br /&gt;
== OpenSource Software and TCG == &lt;br /&gt;
TCG has huge implication for the development of free software. Following a possibly expensive evaluation there will be a signature for one program version. Even if the program is licensed under the GPL every change to the code will make the signature invalid. This seems to be a strong violation of the main philosophy of OpenSource software.&lt;br /&gt;
&lt;br /&gt;
Since Microsoft controls an overwhelming part of the OS market, it seems to be rather difficult to evaluate the TCG proposal separated from the Palladium project.&lt;br /&gt;
&lt;br /&gt;
TCG versus GPL: At least two companies are researching on &amp;quot;TCG-enhanced&amp;quot; versions of GNU/Linux. According most security researchers it seems to be necessary to evaluate programs which have access to the 'trusted part'. &lt;br /&gt;
&lt;br /&gt;
== Related Links ==&lt;br /&gt;
*[http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html 'Trusted Computing' Frequently Asked Questions] - Anti-TC FAQ by Cambridge University security director and professor [[Ross Anderson]].&lt;br /&gt;
*[http://www.againsttcpa.com/ Against-TCPA]&lt;br /&gt;
*[http://invisiblog.com/1c801df4aee49232/article/0df117d5d9b32aea8bc23194ecc270ec Interesting Uses of Trusted Computing]&lt;br /&gt;
*[http://www.gnu.org/philosophy/can-you-trust.html Can you trust your computer?] essay by the FSF&lt;br /&gt;
*[http://www.protectprivacy.org/topic--lang-en.html The civil rights organisation Protect Privacy]&lt;br /&gt;
&lt;br /&gt;
== Read more at Wikipedia, the free encyclopedia: ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_computing Trusted Computing]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_Computing_Platform_Alliance Trusted Computing Group (formerly known as TCPA)]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Fritz-chip Fritz-Chip]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Palladium_operating_system Palladium]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Cryptography Wikipedia-Category: Cryptography]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Copyright_law Wikipedia-Category: Copyright Law]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Digital_rights_management Wikipedia-Category: Digital Rights Management]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Notes from the original artical that didn't fit so far&lt;br /&gt;
You own a ThinkPad build after the year 2000? Or you want to buy a brandnew ThinkPad from Levono (IBM)? Do you want to know, what the Embedded Security Subsystem is doing (or can do) in your ThinkPad? &lt;br /&gt;
&lt;br /&gt;
If you answer one or all of these questions with yes, read on :-) This is about Trusted Computing, TCPA, Palladium, the &amp;quot;Fritz&amp;quot;-Chip, Digital Rights Management and your freedom of choice. At the end of this article you find related hyperlinks to this important topic for computer users.&lt;br /&gt;
&lt;br /&gt;
Compared to this, positive features like a more secure hardware storage for cryptographic keys seem to be a very small benefit.&lt;br /&gt;
&lt;br /&gt;
:Compared with the TCPA the TCG is less democratic organized and the high membership fees obstruct the possibilities for small companies and non profit organizations to participate.&lt;br /&gt;
&lt;br /&gt;
* Microsofts own concept for 'Trustworthy Computing', &amp;quot;Palladium&amp;quot;, is expected to cost some hundreds of million cash.&lt;br /&gt;
&lt;br /&gt;
What is all the name changing about? &amp;lt;br /&amp;gt;&lt;br /&gt;
Some say, that the change was a reaction to the negative publicity, because Palladium and TCPA was soon equated with a 'Nineteen Eighty-Four'-Scenario of an 'Orwellian society', the ever-present, all-seeing 'Big Brother' and other privacy issues.&lt;br /&gt;
&lt;br /&gt;
'''This means e.g. if the user wants to use his music to a portable player he should be forced to buy another license. It seems to be doubtful, if customers will enjoy this limitations.'''&lt;br /&gt;
&lt;br /&gt;
In any case the possible problems of giving away control of the personal hardware should be evaluated carefully.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6126</id>
		<title>Talk:TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6126"/>
		<updated>2005-07-04T19:16:31Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: minor typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Discussion about the article &amp;quot;Trusted or Treacherous&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
Please add you comments here. &lt;br /&gt;
&lt;br /&gt;
You can use the &amp;quot;Plus&amp;quot;(+)-Button next to the &amp;quot;edit&amp;quot;-button at the top of this page to add you comments at the right spot ;-)&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 11:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Plagiarism? ==&lt;br /&gt;
&lt;br /&gt;
Large parts of this article apparently consist of unattributed, near-verbatim excerpts from a SANE2004 paper by Weis, Lucks, and Bogk, [http://www.cryptolabs.org/CCC2004TCunendlich/WeisLucksBogkSane2004tcg12.pdf TCG 1.2 - fair play with the 'Fritz' chip?]. Regardless of whether one believes that general political/ethical concerns about Trusted Computing belong on a Thinkpad-specific site, wholesale copying of unidentified, and presumably copyrighted, material is not cool, and could get the whole project in trouble.&lt;br /&gt;
&lt;br /&gt;
I would suggest that the non-original parts of this article be removed and replaced by an external link to the above-mentioned paper; any particularly crucial short excerpts (as permitted by &amp;quot;fair use&amp;quot;) should be clearly identified as such. The specific information about how the TCG specifications are implemented on various Thinkpad models can stay, of course.&lt;br /&gt;
&lt;br /&gt;
== The Source is under Creative Commons, isn't it? ==&lt;br /&gt;
&lt;br /&gt;
Hello Andrzej,&lt;br /&gt;
&lt;br /&gt;
yes, you are right, this text on a website of the presentation of the annual chaos computer club is one of my sources, but I think, it is under creative commons license by-nc-sa 2.0 de. And are the presentations of the chaos computer congress not also free unless the speakers don't want it??????&lt;br /&gt;
&lt;br /&gt;
This license allows to copy, distribute, display, perform or modify the text as long as it is published under exactly the same creative commons license and licensees may not use the work for commercial purposes - unless they get the licensor's permission.&lt;br /&gt;
&lt;br /&gt;
My problem was, I had a lot more sources in a different language than english and my first drafts were way to long!&lt;br /&gt;
&lt;br /&gt;
It didn't worked to keep it that short but detailed, as Ruediger and Adreas wrote it.&lt;br /&gt;
&lt;br /&gt;
But if you think, after my explanation the actual version is still problematic, I will delete it of course!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:12, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Thanks for your work, i like it ==&lt;br /&gt;
&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
thank you very much for editing and restructering of that article.&lt;br /&gt;
&lt;br /&gt;
I think, I know know what you and Andrzej want and I will try in he next days, to change the article in that way, okay?&lt;br /&gt;
&lt;br /&gt;
P.S.: I don't know, why I loose my logged-in status from time to time, perhaps my connection. I am sorry, that there are IP-Adresses instead of my unsername &amp;quot;pitsche&amp;quot;, I hope, no one gets confused, which edit is by me and which one by someone else :-o&lt;br /&gt;
&lt;br /&gt;
Sorry.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:15, 4 Jul 2005 (CEST)&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6122</id>
		<title>Talk:TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6122"/>
		<updated>2005-07-04T19:15:51Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: Thanks for your work, i like it&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Discussion about the article &amp;quot;Trusted or Treacherous&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
Please add you comments here. &lt;br /&gt;
&lt;br /&gt;
You can use the &amp;quot;Plus&amp;quot;(+)-Button next to the &amp;quot;edit&amp;quot;-button at the top of this page to add you comments at the right spot ;-)&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 11:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Plagiarism? ==&lt;br /&gt;
&lt;br /&gt;
Large parts of this article apparently consist of unattributed, near-verbatim excerpts from a SANE2004 paper by Weis, Lucks, and Bogk, [http://www.cryptolabs.org/CCC2004TCunendlich/WeisLucksBogkSane2004tcg12.pdf TCG 1.2 - fair play with the 'Fritz' chip?]. Regardless of whether one believes that general political/ethical concerns about Trusted Computing belong on a Thinkpad-specific site, wholesale copying of unidentified, and presumably copyrighted, material is not cool, and could get the whole project in trouble.&lt;br /&gt;
&lt;br /&gt;
I would suggest that the non-original parts of this article be removed and replaced by an external link to the above-mentioned paper; any particularly crucial short excerpts (as permitted by &amp;quot;fair use&amp;quot;) should be clearly identified as such. The specific information about how the TCG specifications are implemented on various Thinkpad models can stay, of course.&lt;br /&gt;
&lt;br /&gt;
== The Source is under Creative Commons, isn't it? ==&lt;br /&gt;
&lt;br /&gt;
Hello Andrzej,&lt;br /&gt;
&lt;br /&gt;
yes, you are right, this text on a website of the presentation of the annual chaos computer club is one of my sources, but I think, it is under creative commons license by-nc-sa 2.0 de. And are the presentations of the chaos computer congress not also free unless the speakers don't want it??????&lt;br /&gt;
&lt;br /&gt;
This license allows to copy, distribute, display, perform or modify the text as long as it is published under exactly the same creative commons license and licensees may not use the work for commercial purposes - unless they get the licensor's permission.&lt;br /&gt;
&lt;br /&gt;
My problem was, I had a lot more sources in a different language than english and my first drafts were way to long!&lt;br /&gt;
&lt;br /&gt;
It didn't worked to keep it that short but detailed, as Ruediger and Adreas wrote it.&lt;br /&gt;
&lt;br /&gt;
But if you think, after my explanation the actual version is still problematic, I will delete it of course!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:12, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Thanks for your work, i like it ==&lt;br /&gt;
&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
thank you very much for editing and restructering of that article.&lt;br /&gt;
&lt;br /&gt;
I think, I know know what you and Andrzej want and I will try in he next days, to change the article in that way, okay?&lt;br /&gt;
&lt;br /&gt;
P.S.: I don't know, why I loose my logged-in status from time to time, perhaps my connection. I am sorry, that there are IP-Adresses instead of my unsername &amp;quot;pitsche&amp;quot;, I hope, no one gets confused, which edit is be me and which one by someone else :-o&lt;br /&gt;
&lt;br /&gt;
Sorry.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:15, 4 Jul 2005 (CEST)&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6120</id>
		<title>Talk:TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6120"/>
		<updated>2005-07-04T19:12:38Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: /* The Source is under Creative Commons, isn't it? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Discussion about the article &amp;quot;Trusted or Treacherous&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
Please add you comments here. &lt;br /&gt;
&lt;br /&gt;
You can use the &amp;quot;Plus&amp;quot;(+)-Button next to the &amp;quot;edit&amp;quot;-button at the top of this page to add you comments at the right spot ;-)&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 11:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Plagiarism? ==&lt;br /&gt;
&lt;br /&gt;
Large parts of this article apparently consist of unattributed, near-verbatim excerpts from a SANE2004 paper by Weis, Lucks, and Bogk, [http://www.cryptolabs.org/CCC2004TCunendlich/WeisLucksBogkSane2004tcg12.pdf TCG 1.2 - fair play with the 'Fritz' chip?]. Regardless of whether one believes that general political/ethical concerns about Trusted Computing belong on a Thinkpad-specific site, wholesale copying of unidentified, and presumably copyrighted, material is not cool, and could get the whole project in trouble.&lt;br /&gt;
&lt;br /&gt;
I would suggest that the non-original parts of this article be removed and replaced by an external link to the above-mentioned paper; any particularly crucial short excerpts (as permitted by &amp;quot;fair use&amp;quot;) should be clearly identified as such. The specific information about how the TCG specifications are implemented on various Thinkpad models can stay, of course.&lt;br /&gt;
&lt;br /&gt;
== The Source is under Creative Commons, isn't it? ==&lt;br /&gt;
&lt;br /&gt;
Hello Andrzej,&lt;br /&gt;
&lt;br /&gt;
yes, you are right, this text on a website of the presentation of the annual chaos computer club is one of my sources, but I think, it is under creative commons license by-nc-sa 2.0 de. And are the presentations of the chaos computer congress not also free unless the speakers don't want it??????&lt;br /&gt;
&lt;br /&gt;
This license allows to copy, distribute, display, perform or modify the text as long as it is published under exactly the same creative commons license and licensees may not use the work for commercial purposes - unless they get the licensor's permission.&lt;br /&gt;
&lt;br /&gt;
My problem was, I had a lot more sources in a different language than english and my first drafts were way to long!&lt;br /&gt;
&lt;br /&gt;
It didn't worked to keep it that short but detailed, as Ruediger and Adreas wrote it.&lt;br /&gt;
&lt;br /&gt;
But if you think, after my explanation the actual version is still problematic, I will delete it of course!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:12, 4 Jul 2005 (CEST)&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6109</id>
		<title>TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6109"/>
		<updated>2005-07-04T10:26:09Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: minor typo again&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Trusted or Treacherous??? ==&lt;br /&gt;
&lt;br /&gt;
You own a ThinkPad build after the year 2000? Or you want to buy a brandnew ThinkPad from Levono (IBM)? Do you want to know, what the Embedded Security Subsystem is doing (or can do) in your ThinkPad? &lt;br /&gt;
&lt;br /&gt;
If you answer one or all of these questions with yes, read on :-) This is about Trusted Computing, TCPA, Palladium, the &amp;quot;Fritz&amp;quot;-Chip, Digital Rights Management and your freedom of choice. At the end of this article you find related hyperlinks to this important topic for computer users.&lt;br /&gt;
&lt;br /&gt;
{{NOTE|The following quote is a very short version of the promises and risks of Trusted Computing as the TCG wants it. &lt;br /&gt;
&lt;br /&gt;
After the quote, I will provide you with more informations, but reading only the following quote will give you at least a litle impresion...&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Where's the problem?''&lt;br /&gt;
&lt;br /&gt;
''It is clear that trusted computing hardware provides security benefits, if software is prepared to take advantage of it. But trusted computing has been received skeptically and remains controversial. Some of the controversy is based on misconceptions, but much of it is appropriate, since trusted computing systems fundamentally alter trust relationships. Legitimate concerns about trusted computing are not limited to one area, such as consumer privacy or copyright issues.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''We have at least two serious concerns about trusted computing. First, existing designs are fundamentally flawed because they expose the public to new risks of anti-competitive and anti-consumer behavior. Second, manufacturers of particular &amp;quot;trusted&amp;quot; computers and components may secretly implement them incorrectly.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''[...]'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''Conclusion''&lt;br /&gt;
&lt;br /&gt;
''We recognize that hardware enhancements might be one way to improve computer security. But treating computer owners as adversaries is not progress in computer security. &amp;lt;br /&amp;gt;'''The interoperability, competition, owner control, and similar problems inherent in the TCG and NCSCB approach are serious enough that we recommend against adoption of these trusted computing technologies until these problems have been addressed. Fortunately, we believe these problems are not insurmountable''', and we look forward to working with the industry to resolve them.&amp;quot;''&lt;br /&gt;
&lt;br /&gt;
Quote in italic, bold emphasis by me, Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation].}}&lt;br /&gt;
&lt;br /&gt;
=== Background: ===&lt;br /&gt;
&lt;br /&gt;
Recently, the number of known security incidents has been dramatically increasing. Thus, security issues in computer industry have been pushed forward. &lt;br /&gt;
&lt;br /&gt;
The Trustworthy Computing Initiative by Microsoft and other members of the Trusted Computing Group (TCG) are working on a paradigm&lt;br /&gt;
shift in information technology, which will be the biggest change of the information landscape since decades.&lt;br /&gt;
&lt;br /&gt;
The new concept is to place an especially &amp;quot;trusted&amp;quot; observer (a.k.a. &amp;quot;Fritz&amp;quot;-Chip, a secure cryptographic coprocessor) into information handling devices, to prevent even the device owner from certain operations. &lt;br /&gt;
&lt;br /&gt;
In this context, &amp;quot;trusted&amp;quot; thus means that the owner of the information can trust the device, and verify that the device's &amp;quot;trustworthiness&amp;quot;, while on the other hand the device owner no longer has full control over her device.&lt;br /&gt;
&lt;br /&gt;
According of a lot of technical analysis most researchers have fundamental critics on the main design considerations. The new infrastructure will offer '''only minor protection against worms and viruses'''. &lt;br /&gt;
On the other hand Trusted Computing offers a lot of features which can be used to protect the personal computer against the users.&lt;br /&gt;
&lt;br /&gt;
Compared to this, positive features like a more secure hardware storage for cryptographic keys seem to be a very small benefit.&lt;br /&gt;
&lt;br /&gt;
Additionally, the market domination of Microsoft, obscurities regarding the needed trust infrastructure and a heap of patents have lead to critical evaluations from cryptographers, privacy organizations and European institutions. &amp;lt;br /&amp;gt;&lt;br /&gt;
Because of this pressure the Trusted Computing Group has modifed its proposal. The recent specification is &amp;quot;TCG 1.2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== A short history of TCPA, TCG, Palladium and NSCB: ===&lt;br /&gt;
&lt;br /&gt;
* 1999: The Trusted Computing Platform Alliance (TCPA) is founded by Intel, Microsoft, HP, Compaq and IBM. &lt;br /&gt;
* 2002: The TCPA Main Specification Version 1.1b has been published in February 2002. &lt;br /&gt;
* 2003: The Trusted Computing Group (TCG) is founded in April 2003 by AMD, HP, IBM, Intel and Microsoft.&lt;br /&gt;
&lt;br /&gt;
:Compared with the TCPA the TCG is less democratic organized and the high membership fees obstruct the possibilities for small companies and non profit organizations to participate.&lt;br /&gt;
&lt;br /&gt;
* Microsofts own concept for 'Trustworthy Computing', &amp;quot;Palladium&amp;quot;, is expected to cost some hundreds of million cash.&lt;br /&gt;
* In the beginning of 2003 the name was changed to &amp;quot;next-generation secure computing base&amp;quot; (NGSCB).&lt;br /&gt;
* In summer 2004 the NGSCB effort seems to have stopped.&lt;br /&gt;
&lt;br /&gt;
What is all the name changing about? &amp;lt;br /&amp;gt;&lt;br /&gt;
Some say, that the change was a reaction to the negative publicity, because Palladium and TCPA was soon equated with a 'Nineteen Eighty-Four'-Scenario of an 'Orwellian society', the ever-present, all-seeing 'Big Brother' and other privacy issues.&lt;br /&gt;
&lt;br /&gt;
=== TCG Hardware Architecture ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Trusted Platform Module (TPM)&amp;quot; (a.k.a. &amp;quot;Fritz&amp;quot;-Chip) is the central building block of the TCG architecture and the first implementation can be seen as just a hardwired smart card. &lt;br /&gt;
&lt;br /&gt;
There are also discussions to integrate the whole functionality into the main processor, which would increase resistance against tampering attacks (see also Intel &amp;quot;LaGrande&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
The most important services of the TCG specifications are:&lt;br /&gt;
* Hardware storage for cryptographic keys&lt;br /&gt;
* Secure booting&lt;br /&gt;
* (Remote) Platform Attestation (''meaning that somebody can check the state of your personal computer over the internet'')&lt;br /&gt;
* Sealing (''meaning binding data to a specific platform and application'')&lt;br /&gt;
&lt;br /&gt;
Generally: There are good arguments that these features can be used to improve the security of computer systems. &amp;lt;br /&amp;gt;&lt;br /&gt;
But: Some of these features can already be established by todays smart card supported systems! &lt;br /&gt;
&lt;br /&gt;
Drawback 1: &lt;br /&gt;
Remote Attestation is a good feature to remotely detect tampering of the computer, as long as this 'somebody' is the owner of the platform. &amp;lt;br /&amp;gt; &lt;br /&gt;
But: If this Remote Attestation is used by third parties, serious privacy and market domination issues arise.&lt;br /&gt;
&lt;br /&gt;
Drawback 2: &lt;br /&gt;
There are certainly legitimate reasons for Sealing. &amp;lt;br /&amp;gt;&lt;br /&gt;
But: The main use case seems to be consumer-unfriendly new 'business cases' for content dealers which involve locking down content to a single platform, based on connecting content to a specific device without any migration options. '''This means e.g. if the user wants to use his music to a portable player he should be forced to buy another license. It seems to be doubtful, if customers will enjoy this limitations.''' &lt;br /&gt;
&lt;br /&gt;
In any case the possible problems of giving away control of the personal hardware should be evaluated carefully.&lt;br /&gt;
&lt;br /&gt;
There have also been two important critiques regarding the hardware security of the &amp;quot;Trusted Platform Modules (TPM)&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The first one has been the insuficient security certification against hardware attacks. In TCG 1.2 this critique has been addressed by an improvement of the hardware requirements and it has to be seen how strong the resistance against sophisticated attacks at intensively daily usage will be.&lt;br /&gt;
&lt;br /&gt;
The second one addreses the 'black box'-characterisitcs and therefore 'hidden channels' in the TCG-Hardware. Hidden channels smuggle secret information to third parties and it has been a well known fact for many years, that hidden channels are easy to implement in black box hardware.&lt;br /&gt;
&lt;br /&gt;
=== TCG and Digital 'Restrictions' Management ===&lt;br /&gt;
&lt;br /&gt;
As stated above, the philosophy behind Remote Platform Attestation and Sealing seems to be a protection of the computer system or electronic device ''against'' its user and owner. &lt;br /&gt;
&lt;br /&gt;
What will do this to the use of digital media content on electronic devices? The answer of the IT- and the Entertainment-Industry is &amp;quot;Digital Rights Management&amp;quot; or just shortly &amp;quot;DRM&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
''The DRM component takes control over the rest of the user's device which they rightfully own (e.g. MP3-Player'' '''or a ThinkPad)''' ''and restricts how it may act, regardless of the user's wishes (e.g. preventing the user from copying a song). All forms of DRM depend on the device imposing restrictions that cannot be legally disabled or modified by the user. In other words, the user has no choice.''&lt;br /&gt;
&lt;br /&gt;
So a new 'name' for DRM came up: '''Digital Restrictions Management''' instead of Digital Rights Management. &lt;br /&gt;
&lt;br /&gt;
I cannot go too much into the details here, so please have a look at the [http://en.wikipedia.org/wiki/Digital_rights_management#DRM_opponents article in the Wikipedia Encyclopedia], where I took the quote from. The bold emphasised addition is mine.&lt;br /&gt;
&lt;br /&gt;
=== Censorship and Avoiding Whistle Blowers ===&lt;br /&gt;
&lt;br /&gt;
The Siamese twin of Digital Restriction Management is censorship. '''The same techniques which avoid copying music songs can be used to limit the access to all kinds of documents'''. The combination from DRM and observation hardware (TCG is in your mind?) leads to very dangerous implications.&lt;br /&gt;
&lt;br /&gt;
Giving a real world example, the Chinese government could easily block the use of all documents containing the words &amp;quot;Dalai Lama&amp;quot; on 'trusted' computer systems.&lt;br /&gt;
&lt;br /&gt;
Another application is the fight against whistle blowers. E.g. government documents about the deportation of own citizens to countries with a doubtful law system or about supporting illegal wars could made only readable for government computers and combined with a expiration date. This might make it very dificult for the society or following generations to disclose these breaches of humanity.&lt;br /&gt;
&lt;br /&gt;
=== Open Source Software and TCG === &lt;br /&gt;
&lt;br /&gt;
Since Microsoft controls a overwhelming part of the OS market, it seems to be rather dificult to evaluate the TCG proposal separated from the Palladium project.&lt;br /&gt;
&lt;br /&gt;
TCG versus GPL: At least two companies are researching on &amp;quot;TCG-enhanced&amp;quot; versions of GNU/Linux. According most security researchers it seems to be necessary to evaluate programs which have access to the 'trusted part'. &lt;br /&gt;
&lt;br /&gt;
This has huge implication for the development of free software. Following a possibly expensive evaluation there will be a signature for one program version. &lt;br /&gt;
&lt;br /&gt;
Even if the program stays under GPL every change of the code will make the signature invalid. This seems to be a strong violation of the main philosophy of Open Source software.&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security System (1.0) ===&lt;br /&gt;
&lt;br /&gt;
Embedded Security System (in IBM documents there is no use of the additive version-nummer 1.0) is using the heayvily disputed &amp;quot;TCG 1.1&amp;quot;-specification.&lt;br /&gt;
&lt;br /&gt;
''(Features etc. will soon be added here - your help, support or cooperation is very much appreciated)''&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security System 2.0 ===&lt;br /&gt;
&lt;br /&gt;
The recent TCG-specification is &amp;quot;TCG 1.2&amp;quot; and Embedded Security System 2.0 is supposed to use this newer specification.&lt;br /&gt;
&lt;br /&gt;
''(Features etc. will soon be added here - your help, support or cooperation is very much appreciated)''&lt;br /&gt;
&lt;br /&gt;
=== Summary === &lt;br /&gt;
&lt;br /&gt;
There are still a lot of critical questions, even though TCG 1.2 contains many steps into the right direction. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html 'Trusted Computing' Frequently Asked Questions] - Anti-TC FAQ by Cambridge University security director and professor [[Ross Anderson]].&lt;br /&gt;
*[http://www.againsttcpa.com/ Against-TCPA]&lt;br /&gt;
*[http://invisiblog.com/1c801df4aee49232/article/0df117d5d9b32aea8bc23194ecc270ec Interesting Uses of Trusted Computing]&lt;br /&gt;
*[http://www.gnu.org/philosophy/can-you-trust.html Can you trust your computer?] essay by the FSF&lt;br /&gt;
*[http://www.protectprivacy.org/topic--lang-en.html The civil rights organisation Protect Privacy]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Read more at Wikipedia, the free encyclopedia: ==&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_computing Trusted Computing]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_Computing_Platform_Alliance Trusted Computing Group (formerly known as TCPA)]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Fritz-chip Fritz-Chip]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Palladium_operating_system Palladium]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Cryptography Wikipedia-Category: Cryptography]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Copyright_law Wikipedia-Category: Copyright Law]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Digital_rights_management Wikipedia-Category: Digital Rights Management]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ThinkPad-Models with TCPA: ==&lt;br /&gt;
&lt;br /&gt;
TCPA was introduced as the so called &amp;quot;Embedded Security System&amp;quot; for the first time in the ThinkPad T23 (July 2001). &lt;br /&gt;
&lt;br /&gt;
Almost every ThinkPad, which was build after the T23-Series is equipped with &amp;quot;Embedded Security System&amp;quot; or &amp;quot;Embedded Security System v2.0&amp;quot; - except for the A30-Model (but the A30p has a &amp;quot;Embedded Security System&amp;quot;!!!).&lt;br /&gt;
&lt;br /&gt;
If you want to buy a renewed or used ThinkPad with a Pentium III-CPU, but don't want TCPA inside, than you can choose between the A30 or every model version of the A22-, A21-, A20-, T21-, T20-Series or the 240X, the 570E or the 600X (errors may occur, so please check for yourself before buying!).&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6107</id>
		<title>TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6107"/>
		<updated>2005-07-04T10:25:36Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: added just some more models that i forgot to include&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Trusted or Treacherous??? ==&lt;br /&gt;
&lt;br /&gt;
You own a ThinkPad build after the year 2000? Or you want to buy a brandnew ThinkPad from Levono (IBM)? Do you want to know, what the Embedded Security Subsystem is doing (or can do) in your ThinkPad? &lt;br /&gt;
&lt;br /&gt;
If you answer one or all of these questions with yes, read on :-) This is about Trusted Computing, TCPA, Palladium, the &amp;quot;Fritz&amp;quot;-Chip, Digital Rights Management and your freedom of choice. At the end of this article you find related hyperlinks to this important topic for computer users.&lt;br /&gt;
&lt;br /&gt;
{{NOTE|The following quote is a very short version of the promises and risks of Trusted Computing as the TCG wants it. &lt;br /&gt;
&lt;br /&gt;
After the quote, I will provide you with more informations, but reading only the following quote will give you at least a litle impresion...&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Where's the problem?''&lt;br /&gt;
&lt;br /&gt;
''It is clear that trusted computing hardware provides security benefits, if software is prepared to take advantage of it. But trusted computing has been received skeptically and remains controversial. Some of the controversy is based on misconceptions, but much of it is appropriate, since trusted computing systems fundamentally alter trust relationships. Legitimate concerns about trusted computing are not limited to one area, such as consumer privacy or copyright issues.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''We have at least two serious concerns about trusted computing. First, existing designs are fundamentally flawed because they expose the public to new risks of anti-competitive and anti-consumer behavior. Second, manufacturers of particular &amp;quot;trusted&amp;quot; computers and components may secretly implement them incorrectly.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''[...]'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''Conclusion''&lt;br /&gt;
&lt;br /&gt;
''We recognize that hardware enhancements might be one way to improve computer security. But treating computer owners as adversaries is not progress in computer security. &amp;lt;br /&amp;gt;'''The interoperability, competition, owner control, and similar problems inherent in the TCG and NCSCB approach are serious enough that we recommend against adoption of these trusted computing technologies until these problems have been addressed. Fortunately, we believe these problems are not insurmountable''', and we look forward to working with the industry to resolve them.&amp;quot;''&lt;br /&gt;
&lt;br /&gt;
Quote in italic, bold emphasis by me, Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation].}}&lt;br /&gt;
&lt;br /&gt;
=== Background: ===&lt;br /&gt;
&lt;br /&gt;
Recently, the number of known security incidents has been dramatically increasing. Thus, security issues in computer industry have been pushed forward. &lt;br /&gt;
&lt;br /&gt;
The Trustworthy Computing Initiative by Microsoft and other members of the Trusted Computing Group (TCG) are working on a paradigm&lt;br /&gt;
shift in information technology, which will be the biggest change of the information landscape since decades.&lt;br /&gt;
&lt;br /&gt;
The new concept is to place an especially &amp;quot;trusted&amp;quot; observer (a.k.a. &amp;quot;Fritz&amp;quot;-Chip, a secure cryptographic coprocessor) into information handling devices, to prevent even the device owner from certain operations. &lt;br /&gt;
&lt;br /&gt;
In this context, &amp;quot;trusted&amp;quot; thus means that the owner of the information can trust the device, and verify that the device's &amp;quot;trustworthiness&amp;quot;, while on the other hand the device owner no longer has full control over her device.&lt;br /&gt;
&lt;br /&gt;
According of a lot of technical analysis most researchers have fundamental critics on the main design considerations. The new infrastructure will offer '''only minor protection against worms and viruses'''. &lt;br /&gt;
On the other hand Trusted Computing offers a lot of features which can be used to protect the personal computer against the users.&lt;br /&gt;
&lt;br /&gt;
Compared to this, positive features like a more secure hardware storage for cryptographic keys seem to be a very small benefit.&lt;br /&gt;
&lt;br /&gt;
Additionally, the market domination of Microsoft, obscurities regarding the needed trust infrastructure and a heap of patents have lead to critical evaluations from cryptographers, privacy organizations and European institutions. &amp;lt;br /&amp;gt;&lt;br /&gt;
Because of this pressure the Trusted Computing Group has modifed its proposal. The recent specification is &amp;quot;TCG 1.2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== A short history of TCPA, TCG, Palladium and NSCB: ===&lt;br /&gt;
&lt;br /&gt;
* 1999: The Trusted Computing Platform Alliance (TCPA) is founded by Intel, Microsoft, HP, Compaq and IBM. &lt;br /&gt;
* 2002: The TCPA Main Specification Version 1.1b has been published in February 2002. &lt;br /&gt;
* 2003: The Trusted Computing Group (TCG) is founded in April 2003 by AMD, HP, IBM, Intel and Microsoft.&lt;br /&gt;
&lt;br /&gt;
:Compared with the TCPA the TCG is less democratic organized and the high membership fees obstruct the possibilities for small companies and non profit organizations to participate.&lt;br /&gt;
&lt;br /&gt;
* Microsofts own concept for 'Trustworthy Computing', &amp;quot;Palladium&amp;quot;, is expected to cost some hundreds of million cash.&lt;br /&gt;
* In the beginning of 2003 the name was changed to &amp;quot;next-generation secure computing base&amp;quot; (NGSCB).&lt;br /&gt;
* In summer 2004 the NGSCB effort seems to have stopped.&lt;br /&gt;
&lt;br /&gt;
What is all the name changing about? &amp;lt;br /&amp;gt;&lt;br /&gt;
Some say, that the change was a reaction to the negative publicity, because Palladium and TCPA was soon equated with a 'Nineteen Eighty-Four'-Scenario of an 'Orwellian society', the ever-present, all-seeing 'Big Brother' and other privacy issues.&lt;br /&gt;
&lt;br /&gt;
=== TCG Hardware Architecture ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Trusted Platform Module (TPM)&amp;quot; (a.k.a. &amp;quot;Fritz&amp;quot;-Chip) is the central building block of the TCG architecture and the first implementation can be seen as just a hardwired smart card. &lt;br /&gt;
&lt;br /&gt;
There are also discussions to integrate the whole functionality into the main processor, which would increase resistance against tampering attacks (see also Intel &amp;quot;LaGrande&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
The most important services of the TCG specifications are:&lt;br /&gt;
* Hardware storage for cryptographic keys&lt;br /&gt;
* Secure booting&lt;br /&gt;
* (Remote) Platform Attestation (''meaning that somebody can check the state of your personal computer over the internet'')&lt;br /&gt;
* Sealing (''meaning binding data to a specific platform and application'')&lt;br /&gt;
&lt;br /&gt;
Generally: There are good arguments that these features can be used to improve the security of computer systems. &amp;lt;br /&amp;gt;&lt;br /&gt;
But: Some of these features can already be established by todays smart card supported systems! &lt;br /&gt;
&lt;br /&gt;
Drawback 1: &lt;br /&gt;
Remote Attestation is a good feature to remotely detect tampering of the computer, as long as this 'somebody' is the owner of the platform. &amp;lt;br /&amp;gt; &lt;br /&gt;
But: If this Remote Attestation is used by third parties, serious privacy and market domination issues arise.&lt;br /&gt;
&lt;br /&gt;
Drawback 2: &lt;br /&gt;
There are certainly legitimate reasons for Sealing. &amp;lt;br /&amp;gt;&lt;br /&gt;
But: The main use case seems to be consumer-unfriendly new 'business cases' for content dealers which involve locking down content to a single platform, based on connecting content to a specific device without any migration options. '''This means e.g. if the user wants to use his music to a portable player he should be forced to buy another license. It seems to be doubtful, if customers will enjoy this limitations.''' &lt;br /&gt;
&lt;br /&gt;
In any case the possible problems of giving away control of the personal hardware should be evaluated carefully.&lt;br /&gt;
&lt;br /&gt;
There have also been two important critiques regarding the hardware security of the &amp;quot;Trusted Platform Modules (TPM)&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The first one has been the insuficient security certification against hardware attacks. In TCG 1.2 this critique has been addressed by an improvement of the hardware requirements and it has to be seen how strong the resistance against sophisticated attacks at intensively daily usage will be.&lt;br /&gt;
&lt;br /&gt;
The second one addreses the 'black box'-characterisitcs and therefore 'hidden channels' in the TCG-Hardware. Hidden channels smuggle secret information to third parties and it has been a well known fact for many years, that hidden channels are easy to implement in black box hardware.&lt;br /&gt;
&lt;br /&gt;
=== TCG and Digital 'Restrictions' Management ===&lt;br /&gt;
&lt;br /&gt;
As stated above, the philosophy behind Remote Platform Attestation and Sealing seems to be a protection of the computer system or electronic device ''against'' its user and owner. &lt;br /&gt;
&lt;br /&gt;
What will do this to the use of digital media content on electronic devices? The answer of the IT- and the Entertainment-Industry is &amp;quot;Digital Rights Management&amp;quot; or just shortly &amp;quot;DRM&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
''The DRM component takes control over the rest of the user's device which they rightfully own (e.g. MP3-Player'' '''or a ThinkPad)''' ''and restricts how it may act, regardless of the user's wishes (e.g. preventing the user from copying a song). All forms of DRM depend on the device imposing restrictions that cannot be legally disabled or modified by the user. In other words, the user has no choice.''&lt;br /&gt;
&lt;br /&gt;
So a new 'name' for DRM came up: '''Digital Restrictions Management''' instead of Digital Rights Management. &lt;br /&gt;
&lt;br /&gt;
I cannot go too much into the details here, so please have a look at the [http://en.wikipedia.org/wiki/Digital_rights_management#DRM_opponents article in the Wikipedia Encyclopedia], where I took the quote from. The bold emphasised addition is mine.&lt;br /&gt;
&lt;br /&gt;
=== Censorship and Avoiding Whistle Blowers ===&lt;br /&gt;
&lt;br /&gt;
The Siamese twin of Digital Restriction Management is censorship. '''The same techniques which avoid copying music songs can be used to limit the access to all kinds of documents'''. The combination from DRM and observation hardware (TCG is in your mind?) leads to very dangerous implications.&lt;br /&gt;
&lt;br /&gt;
Giving a real world example, the Chinese government could easily block the use of all documents containing the words &amp;quot;Dalai Lama&amp;quot; on 'trusted' computer systems.&lt;br /&gt;
&lt;br /&gt;
Another application is the fight against whistle blowers. E.g. government documents about the deportation of own citizens to countries with a doubtful law system or about supporting illegal wars could made only readable for government computers and combined with a expiration date. This might make it very dificult for the society or following generations to disclose these breaches of humanity.&lt;br /&gt;
&lt;br /&gt;
=== Open Source Software and TCG === &lt;br /&gt;
&lt;br /&gt;
Since Microsoft controls a overwhelming part of the OS market, it seems to be rather dificult to evaluate the TCG proposal separated from the Palladium project.&lt;br /&gt;
&lt;br /&gt;
TCG versus GPL: At least two companies are researching on &amp;quot;TCG-enhanced&amp;quot; versions of GNU/Linux. According most security researchers it seems to be necessary to evaluate programs which have access to the 'trusted part'. &lt;br /&gt;
&lt;br /&gt;
This has huge implication for the development of free software. Following a possibly expensive evaluation there will be a signature for one program version. &lt;br /&gt;
&lt;br /&gt;
Even if the program stays under GPL every change of the code will make the signature invalid. This seems to be a strong violation of the main philosophy of Open Source software.&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security System (1.0) ===&lt;br /&gt;
&lt;br /&gt;
Embedded Security System (in IBM documents there is no use of the additive version-nummer 1.0) is using the heayvily disputed &amp;quot;TCG 1.1&amp;quot;-specification.&lt;br /&gt;
&lt;br /&gt;
''(Features etc. will soon be added here - your help, support or cooperation is very much appreciated)''&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security System 2.0 ===&lt;br /&gt;
&lt;br /&gt;
The recent TCG-specification is &amp;quot;TCG 1.2&amp;quot; and Embedded Security System 2.0 is supposed to use this newer specification.&lt;br /&gt;
&lt;br /&gt;
''(Features etc. will soon be added here - your help, support or cooperation is very much appreciated)''&lt;br /&gt;
&lt;br /&gt;
=== Summary === &lt;br /&gt;
&lt;br /&gt;
There are still a lot of critical questions, even though TCG 1.2 contains many steps into the right direction. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html 'Trusted Computing' Frequently Asked Questions] - Anti-TC FAQ by Cambridge University security director and professor [[Ross Anderson]].&lt;br /&gt;
*[http://www.againsttcpa.com/ Against-TCPA]&lt;br /&gt;
*[http://invisiblog.com/1c801df4aee49232/article/0df117d5d9b32aea8bc23194ecc270ec Interesting Uses of Trusted Computing]&lt;br /&gt;
*[http://www.gnu.org/philosophy/can-you-trust.html Can you trust your computer?] essay by the FSF&lt;br /&gt;
*[http://www.protectprivacy.org/topic--lang-en.html The civil rights organisation Protect Privacy]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Read more at Wikipedia, the free encyclopedia: ==&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_computing Trusted Computing]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_Computing_Platform_Alliance Trusted Computing Group (formerly known as TCPA)]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Fritz-chip Fritz-Chip]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Palladium_operating_system Palladium]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Cryptography Wikipedia-Category: Cryptography]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Copyright_law Wikipedia-Category: Copyright Law]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Digital_rights_management Wikipedia-Category: Digital Rights Management]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ThinkPad-Models with TCPA: ==&lt;br /&gt;
&lt;br /&gt;
TCPA was introduced as the so called &amp;quot;Embedded Security System&amp;quot; for the first time in the ThinkPad T23 (July 2001). &lt;br /&gt;
&lt;br /&gt;
Almost every ThinkPad, which was build after the T23-Series is equipped with &amp;quot;Embedded Security System&amp;quot; or &amp;quot;Embedded Security System v2.0&amp;quot; - except for the A30-Model (but the A30p has a &amp;quot;Embedded Security System&amp;quot;!!!).&lt;br /&gt;
&lt;br /&gt;
If you want to buy a renewed or used ThinkPad with a Pentium III-CPU, but don't want TCPA inside, than you can choose between the A30 or every model version of the A22-, A21-, A20-, T21-, T20-Series or the 240X, the 570E or the 600X (errors may occur, so please check for yourself befor buying!).&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6106</id>
		<title>TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6106"/>
		<updated>2005-07-04T10:22:07Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: minor typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Trusted or Treacherous??? ==&lt;br /&gt;
&lt;br /&gt;
You own a ThinkPad build after the year 2000? Or you want to buy a brandnew ThinkPad from Levono (IBM)? Do you want to know, what the Embedded Security Subsystem is doing (or can do) in your ThinkPad? &lt;br /&gt;
&lt;br /&gt;
If you answer one or all of these questions with yes, read on :-) This is about Trusted Computing, TCPA, Palladium, the &amp;quot;Fritz&amp;quot;-Chip, Digital Rights Management and your freedom of choice. At the end of this article you find related hyperlinks to this important topic for computer users.&lt;br /&gt;
&lt;br /&gt;
{{NOTE|The following quote is a very short version of the promises and risks of Trusted Computing as the TCG wants it. &lt;br /&gt;
&lt;br /&gt;
After the quote, I will provide you with more informations, but reading only the following quote will give you at least a litle impresion...&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Where's the problem?''&lt;br /&gt;
&lt;br /&gt;
''It is clear that trusted computing hardware provides security benefits, if software is prepared to take advantage of it. But trusted computing has been received skeptically and remains controversial. Some of the controversy is based on misconceptions, but much of it is appropriate, since trusted computing systems fundamentally alter trust relationships. Legitimate concerns about trusted computing are not limited to one area, such as consumer privacy or copyright issues.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''We have at least two serious concerns about trusted computing. First, existing designs are fundamentally flawed because they expose the public to new risks of anti-competitive and anti-consumer behavior. Second, manufacturers of particular &amp;quot;trusted&amp;quot; computers and components may secretly implement them incorrectly.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''[...]'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''Conclusion''&lt;br /&gt;
&lt;br /&gt;
''We recognize that hardware enhancements might be one way to improve computer security. But treating computer owners as adversaries is not progress in computer security. &amp;lt;br /&amp;gt;'''The interoperability, competition, owner control, and similar problems inherent in the TCG and NCSCB approach are serious enough that we recommend against adoption of these trusted computing technologies until these problems have been addressed. Fortunately, we believe these problems are not insurmountable''', and we look forward to working with the industry to resolve them.&amp;quot;''&lt;br /&gt;
&lt;br /&gt;
Quote in italic, bold emphasis by me, Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation].}}&lt;br /&gt;
&lt;br /&gt;
=== Background: ===&lt;br /&gt;
&lt;br /&gt;
Recently, the number of known security incidents has been dramatically increasing. Thus, security issues in computer industry have been pushed forward. &lt;br /&gt;
&lt;br /&gt;
The Trustworthy Computing Initiative by Microsoft and other members of the Trusted Computing Group (TCG) are working on a paradigm&lt;br /&gt;
shift in information technology, which will be the biggest change of the information landscape since decades.&lt;br /&gt;
&lt;br /&gt;
The new concept is to place an especially &amp;quot;trusted&amp;quot; observer (a.k.a. &amp;quot;Fritz&amp;quot;-Chip, a secure cryptographic coprocessor) into information handling devices, to prevent even the device owner from certain operations. &lt;br /&gt;
&lt;br /&gt;
In this context, &amp;quot;trusted&amp;quot; thus means that the owner of the information can trust the device, and verify that the device's &amp;quot;trustworthiness&amp;quot;, while on the other hand the device owner no longer has full control over her device.&lt;br /&gt;
&lt;br /&gt;
According of a lot of technical analysis most researchers have fundamental critics on the main design considerations. The new infrastructure will offer '''only minor protection against worms and viruses'''. &lt;br /&gt;
On the other hand Trusted Computing offers a lot of features which can be used to protect the personal computer against the users.&lt;br /&gt;
&lt;br /&gt;
Compared to this, positive features like a more secure hardware storage for cryptographic keys seem to be a very small benefit.&lt;br /&gt;
&lt;br /&gt;
Additionally, the market domination of Microsoft, obscurities regarding the needed trust infrastructure and a heap of patents have lead to critical evaluations from cryptographers, privacy organizations and European institutions. &amp;lt;br /&amp;gt;&lt;br /&gt;
Because of this pressure the Trusted Computing Group has modifed its proposal. The recent specification is &amp;quot;TCG 1.2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== A short history of TCPA, TCG, Palladium and NSCB: ===&lt;br /&gt;
&lt;br /&gt;
* 1999: The Trusted Computing Platform Alliance (TCPA) is founded by Intel, Microsoft, HP, Compaq and IBM. &lt;br /&gt;
* 2002: The TCPA Main Specification Version 1.1b has been published in February 2002. &lt;br /&gt;
* 2003: The Trusted Computing Group (TCG) is founded in April 2003 by AMD, HP, IBM, Intel and Microsoft.&lt;br /&gt;
&lt;br /&gt;
:Compared with the TCPA the TCG is less democratic organized and the high membership fees obstruct the possibilities for small companies and non profit organizations to participate.&lt;br /&gt;
&lt;br /&gt;
* Microsofts own concept for 'Trustworthy Computing', &amp;quot;Palladium&amp;quot;, is expected to cost some hundreds of million cash.&lt;br /&gt;
* In the beginning of 2003 the name was changed to &amp;quot;next-generation secure computing base&amp;quot; (NGSCB).&lt;br /&gt;
* In summer 2004 the NGSCB effort seems to have stopped.&lt;br /&gt;
&lt;br /&gt;
What is all the name changing about? &amp;lt;br /&amp;gt;&lt;br /&gt;
Some say, that the change was a reaction to the negative publicity, because Palladium and TCPA was soon equated with a 'Nineteen Eighty-Four'-Scenario of an 'Orwellian society', the ever-present, all-seeing 'Big Brother' and other privacy issues.&lt;br /&gt;
&lt;br /&gt;
=== TCG Hardware Architecture ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Trusted Platform Module (TPM)&amp;quot; (a.k.a. &amp;quot;Fritz&amp;quot;-Chip) is the central building block of the TCG architecture and the first implementation can be seen as just a hardwired smart card. &lt;br /&gt;
&lt;br /&gt;
There are also discussions to integrate the whole functionality into the main processor, which would increase resistance against tampering attacks (see also Intel &amp;quot;LaGrande&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
The most important services of the TCG specifications are:&lt;br /&gt;
* Hardware storage for cryptographic keys&lt;br /&gt;
* Secure booting&lt;br /&gt;
* (Remote) Platform Attestation (''meaning that somebody can check the state of your personal computer over the internet'')&lt;br /&gt;
* Sealing (''meaning binding data to a specific platform and application'')&lt;br /&gt;
&lt;br /&gt;
Generally: There are good arguments that these features can be used to improve the security of computer systems. &amp;lt;br /&amp;gt;&lt;br /&gt;
But: Some of these features can already be established by todays smart card supported systems! &lt;br /&gt;
&lt;br /&gt;
Drawback 1: &lt;br /&gt;
Remote Attestation is a good feature to remotely detect tampering of the computer, as long as this 'somebody' is the owner of the platform. &amp;lt;br /&amp;gt; &lt;br /&gt;
But: If this Remote Attestation is used by third parties, serious privacy and market domination issues arise.&lt;br /&gt;
&lt;br /&gt;
Drawback 2: &lt;br /&gt;
There are certainly legitimate reasons for Sealing. &amp;lt;br /&amp;gt;&lt;br /&gt;
But: The main use case seems to be consumer-unfriendly new 'business cases' for content dealers which involve locking down content to a single platform, based on connecting content to a specific device without any migration options. '''This means e.g. if the user wants to use his music to a portable player he should be forced to buy another license. It seems to be doubtful, if customers will enjoy this limitations.''' &lt;br /&gt;
&lt;br /&gt;
In any case the possible problems of giving away control of the personal hardware should be evaluated carefully.&lt;br /&gt;
&lt;br /&gt;
There have also been two important critiques regarding the hardware security of the &amp;quot;Trusted Platform Modules (TPM)&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The first one has been the insuficient security certification against hardware attacks. In TCG 1.2 this critique has been addressed by an improvement of the hardware requirements and it has to be seen how strong the resistance against sophisticated attacks at intensively daily usage will be.&lt;br /&gt;
&lt;br /&gt;
The second one addreses the 'black box'-characterisitcs and therefore 'hidden channels' in the TCG-Hardware. Hidden channels smuggle secret information to third parties and it has been a well known fact for many years, that hidden channels are easy to implement in black box hardware.&lt;br /&gt;
&lt;br /&gt;
=== TCG and Digital 'Restrictions' Management ===&lt;br /&gt;
&lt;br /&gt;
As stated above, the philosophy behind Remote Platform Attestation and Sealing seems to be a protection of the computer system or electronic device ''against'' its user and owner. &lt;br /&gt;
&lt;br /&gt;
What will do this to the use of digital media content on electronic devices? The answer of the IT- and the Entertainment-Industry is &amp;quot;Digital Rights Management&amp;quot; or just shortly &amp;quot;DRM&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
''The DRM component takes control over the rest of the user's device which they rightfully own (e.g. MP3-Player'' '''or a ThinkPad)''' ''and restricts how it may act, regardless of the user's wishes (e.g. preventing the user from copying a song). All forms of DRM depend on the device imposing restrictions that cannot be legally disabled or modified by the user. In other words, the user has no choice.''&lt;br /&gt;
&lt;br /&gt;
So a new 'name' for DRM came up: '''Digital Restrictions Management''' instead of Digital Rights Management. &lt;br /&gt;
&lt;br /&gt;
I cannot go too much into the details here, so please have a look at the [http://en.wikipedia.org/wiki/Digital_rights_management#DRM_opponents article in the Wikipedia Encyclopedia], where I took the quote from. The bold emphasised addition is mine.&lt;br /&gt;
&lt;br /&gt;
=== Censorship and Avoiding Whistle Blowers ===&lt;br /&gt;
&lt;br /&gt;
The Siamese twin of Digital Restriction Management is censorship. '''The same techniques which avoid copying music songs can be used to limit the access to all kinds of documents'''. The combination from DRM and observation hardware (TCG is in your mind?) leads to very dangerous implications.&lt;br /&gt;
&lt;br /&gt;
Giving a real world example, the Chinese government could easily block the use of all documents containing the words &amp;quot;Dalai Lama&amp;quot; on 'trusted' computer systems.&lt;br /&gt;
&lt;br /&gt;
Another application is the fight against whistle blowers. E.g. government documents about the deportation of own citizens to countries with a doubtful law system or about supporting illegal wars could made only readable for government computers and combined with a expiration date. This might make it very dificult for the society or following generations to disclose these breaches of humanity.&lt;br /&gt;
&lt;br /&gt;
=== Open Source Software and TCG === &lt;br /&gt;
&lt;br /&gt;
Since Microsoft controls a overwhelming part of the OS market, it seems to be rather dificult to evaluate the TCG proposal separated from the Palladium project.&lt;br /&gt;
&lt;br /&gt;
TCG versus GPL: At least two companies are researching on &amp;quot;TCG-enhanced&amp;quot; versions of GNU/Linux. According most security researchers it seems to be necessary to evaluate programs which have access to the 'trusted part'. &lt;br /&gt;
&lt;br /&gt;
This has huge implication for the development of free software. Following a possibly expensive evaluation there will be a signature for one program version. &lt;br /&gt;
&lt;br /&gt;
Even if the program stays under GPL every change of the code will make the signature invalid. This seems to be a strong violation of the main philosophy of Open Source software.&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security System (1.0) ===&lt;br /&gt;
&lt;br /&gt;
Embedded Security System (in IBM documents there is no use of the additive version-nummer 1.0) is using the heayvily disputed &amp;quot;TCG 1.1&amp;quot;-specification.&lt;br /&gt;
&lt;br /&gt;
''(Features etc. will soon be added here - your help, support or cooperation is very much appreciated)''&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security System 2.0 ===&lt;br /&gt;
&lt;br /&gt;
The recent TCG-specification is &amp;quot;TCG 1.2&amp;quot; and Embedded Security System 2.0 is supposed to use this newer specification.&lt;br /&gt;
&lt;br /&gt;
''(Features etc. will soon be added here - your help, support or cooperation is very much appreciated)''&lt;br /&gt;
&lt;br /&gt;
=== Summary === &lt;br /&gt;
&lt;br /&gt;
There are still a lot of critical questions, even though TCG 1.2 contains many steps into the right direction. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html 'Trusted Computing' Frequently Asked Questions] - Anti-TC FAQ by Cambridge University security director and professor [[Ross Anderson]].&lt;br /&gt;
*[http://www.againsttcpa.com/ Against-TCPA]&lt;br /&gt;
*[http://invisiblog.com/1c801df4aee49232/article/0df117d5d9b32aea8bc23194ecc270ec Interesting Uses of Trusted Computing]&lt;br /&gt;
*[http://www.gnu.org/philosophy/can-you-trust.html Can you trust your computer?] essay by the FSF&lt;br /&gt;
*[http://www.protectprivacy.org/topic--lang-en.html The civil rights organisation Protect Privacy]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Read more at Wikipedia, the free encyclopedia: ==&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_computing Trusted Computing]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_Computing_Platform_Alliance Trusted Computing Group (formerly known as TCPA)]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Fritz-chip Fritz-Chip]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Palladium_operating_system Palladium]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Cryptography Wikipedia-Category: Cryptography]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Copyright_law Wikipedia-Category: Copyright Law]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Digital_rights_management Wikipedia-Category: Digital Rights Management]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ThinkPad-Models with TCPA: ==&lt;br /&gt;
&lt;br /&gt;
TCPA was introduced as the so called &amp;quot;Embedded Security System&amp;quot; for the first time in the ThinkPad T23 (July 2001). &lt;br /&gt;
&lt;br /&gt;
Almost every ThinkPad, which was build after the T23-Series is equipped with &amp;quot;Embedded Security System&amp;quot; or &amp;quot;Embedded Security System v2.0&amp;quot; - except for the A30-Model (but the A30p has a &amp;quot;Embedded Security System&amp;quot;!!!).&lt;br /&gt;
&lt;br /&gt;
If you want to buy a renewed or used ThinkPad with a Pentium III-CPU, but don't want TCPA inside, than you can choose between A30, every version of the A22-, A21-, A20-Series, etc.&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:Embedded_Security_Subsystem&amp;diff=6465</id>
		<title>Talk:Embedded Security Subsystem</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:Embedded_Security_Subsystem&amp;diff=6465"/>
		<updated>2005-07-04T10:19:24Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: hmmm. depends. but the fear is big, that it is trojan...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Q: Good or Bad?&lt;br /&gt;
&lt;br /&gt;
Someone said: This Security Chip is a hardware trojan. True or false?&lt;br /&gt;
&lt;br /&gt;
== hmmm. depends. but the fear is big, that it is trojan... ==&lt;br /&gt;
&lt;br /&gt;
Hello,&lt;br /&gt;
&lt;br /&gt;
I would say it depends, how TCPA/'Fritz'-Chip is used. But the fear of the critics and (cyber) civil rights people are, that the industry wants to control the use of digital media like MP3, DVD, etc. to prevent copying - even if you own it.&lt;br /&gt;
&lt;br /&gt;
There is also a fear, that there are hidden channels in this black box type of hardware, because hidden channels where found in so many black box type of hardware for years now. What is transmitted over these hidden channels?&lt;br /&gt;
&lt;br /&gt;
The recent modifications by the TCG because of the critic and the resulting pressure are a good beginning. We, the consumers and users, have to go an with our demands, with our critic and we have to look carefully, what TCG and the others are doing here.&lt;br /&gt;
&lt;br /&gt;
Why? Because it will affect all of us sooner or later in using our MP3- or DVD-Players or e.g. -Software on our computers etc. And you can think also about your mobile cellular phones, digital cameras and so on. Digital content, digital media is more and more widespread.&lt;br /&gt;
&lt;br /&gt;
And this is where Digital Rights Management (DRM) comes into the game. DRM is feared to be a trade barrier for a free market, a barrier to future historians, etc.&lt;br /&gt;
&lt;br /&gt;
Trusted Computing is not bad by meaning, but it is bad (or 'lousy'?), how the industry is implementing it. They could do better, right?&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 12:19, 4 Jul 2005 (CEST)&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6108</id>
		<title>Talk:TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6108"/>
		<updated>2005-07-04T09:38:36Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: new&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Discussion about the article &amp;quot;Trusted or Treacherous&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
Please add you comments here. &lt;br /&gt;
&lt;br /&gt;
You can use the &amp;quot;Plus&amp;quot;(+)-Button next to the &amp;quot;edit&amp;quot;-button at the top of this page to add you comments at the right spot ;-)&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 11:38, 4 Jul 2005 (CEST)&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6105</id>
		<title>TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6105"/>
		<updated>2005-07-04T09:35:42Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: ThinkPad-Models with TCPA:&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Trusted or Treacherous??? ==&lt;br /&gt;
&lt;br /&gt;
You own a ThinkPad build after the year 2000? Or you want to buy a brandnew ThinkPad from Levono (IBM)? Do you want to know, what the Embedded Security Subsystem is doing (or can do) in your ThinkPad? &lt;br /&gt;
&lt;br /&gt;
If you answer one or all of these questions with yes, read on :-) This is about Trusted Computing, TCPA, Palladium, the &amp;quot;Fritz&amp;quot;-Chip, Digital Rights Management and your freedom of choice. At the end of this article you find related hyperlinks to this important topic for computer users.&lt;br /&gt;
&lt;br /&gt;
{{NOTE|The following quote is a very short version of the promises and risks of Trusted Computing as the TCG wants it. &lt;br /&gt;
&lt;br /&gt;
After the quote, I will provide you with more informations, but reading only the following quote will give you at least a litle impresion...&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Where's the problem?''&lt;br /&gt;
&lt;br /&gt;
''It is clear that trusted computing hardware provides security benefits, if software is prepared to take advantage of it. But trusted computing has been received skeptically and remains controversial. Some of the controversy is based on misconceptions, but much of it is appropriate, since trusted computing systems fundamentally alter trust relationships. Legitimate concerns about trusted computing are not limited to one area, such as consumer privacy or copyright issues.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''We have at least two serious concerns about trusted computing. First, existing designs are fundamentally flawed because they expose the public to new risks of anti-competitive and anti-consumer behavior. Second, manufacturers of particular &amp;quot;trusted&amp;quot; computers and components may secretly implement them incorrectly.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''[...]'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''Conclusion''&lt;br /&gt;
&lt;br /&gt;
''We recognize that hardware enhancements might be one way to improve computer security. But treating computer owners as adversaries is not progress in computer security. &amp;lt;br /&amp;gt;'''The interoperability, competition, owner control, and similar problems inherent in the TCG and NCSCB approach are serious enough that we recommend against adoption of these trusted computing technologies until these problems have been addressed. Fortunately, we believe these problems are not insurmountable''', and we look forward to working with the industry to resolve them.&amp;quot;''&lt;br /&gt;
&lt;br /&gt;
Quote in italic, bold emphasis by me, Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation].}}&lt;br /&gt;
&lt;br /&gt;
=== Background: ===&lt;br /&gt;
&lt;br /&gt;
Recently, the number of known security incidents has been dramatically increasing. Thus, security issues in computer industry have been pushed forward. &lt;br /&gt;
&lt;br /&gt;
The Trustworthy Computing Initiative by Microsoft and other members of the Trusted Computing Group (TCG) are working on a paradigm&lt;br /&gt;
shift in information technology, which will be the biggest change of the information landscape since decades.&lt;br /&gt;
&lt;br /&gt;
The new concept is to place an especially &amp;quot;trusted&amp;quot; observer (a.k.a. &amp;quot;Fritz&amp;quot;-Chip, a secure cryptographic coprocessor) into information handling devices, to prevent even the device owner from certain operations. &lt;br /&gt;
&lt;br /&gt;
In this context, &amp;quot;trusted&amp;quot; thus means that the owner of the information can trust the device, and verify that the device's &amp;quot;trustworthiness&amp;quot;, while on the other hand the device owner no longer has full control over her device.&lt;br /&gt;
&lt;br /&gt;
According of a lot of technical analysis most researchers have fundamental critics on the main design considerations. The new infrastructure will offer '''only minor protection against worms and viruses'''. &lt;br /&gt;
On the other hand Trusted Computing offers a lot of features which can be used to protect the personal computer against the users.&lt;br /&gt;
&lt;br /&gt;
Compared to this, positive features like a more secure hardware storage for cryptographic keys seem to be a very small benefit.&lt;br /&gt;
&lt;br /&gt;
Additionally, the market domination of Microsoft, obscurities regarding the needed trust infrastructure and a heap of patents have lead to critical evaluations from cryptographers, privacy organizations and European institutions. &amp;lt;br /&amp;gt;&lt;br /&gt;
Because of this pressure the Trusted Computing Group has modifed its proposal. The recent specification is &amp;quot;TCG 1.2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== A short history of TCPA, TCG, Palladium and NSCB: ===&lt;br /&gt;
&lt;br /&gt;
* 1999: The Trusted Computing Platform Alliance (TCPA) is founded by Intel, Microsoft, HP, Compaq and IBM. &lt;br /&gt;
* 2002: The TCPA Main Specification Version 1.1b has been published in February 2002. &lt;br /&gt;
* 2003: The Trusted Computing Group (TCG) is founded in April 2003 by AMD, HP, IBM, Intel and Microsoft.&lt;br /&gt;
&lt;br /&gt;
:Compared with the TCPA the TCG is less democratic organized and the high membership fees obstruct the possibilities for small companies and non profit organizations to participate.&lt;br /&gt;
&lt;br /&gt;
* Microsofts own concept for 'Trustworthy Computing', &amp;quot;Palladium&amp;quot;, is expected to cost some hundreds of million cash.&lt;br /&gt;
* In the beginning of 2003 the name was changed to &amp;quot;next-generation secure computing base&amp;quot; (NGSCB).&lt;br /&gt;
* In summer 2004 the NGSCB effort seems to have stopped.&lt;br /&gt;
&lt;br /&gt;
What is all the name changing about? &amp;lt;br /&amp;gt;&lt;br /&gt;
Some say, that the change was a reaction to the negative publicity, because Palladium and TCPA was soon equated with a 'Nineteen Eighty-Four'-Scenario of an 'Orwellian society', the ever-present, all-seeing 'Big Brother' and other privacy issues.&lt;br /&gt;
&lt;br /&gt;
=== TCG Hardware Architecture ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Trusted Platform Module (TPM)&amp;quot; (a.k.a. &amp;quot;Fritz&amp;quot;-Chip) is the central building block of the TCG architecture and the first implementation can be seen as just a hardwired smart card. &lt;br /&gt;
&lt;br /&gt;
There are also discussions to integrate the whole functionality into the main processor, which would increase resistance against tampering attacks (see also Intel &amp;quot;LaGrande&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
The most important services of the TCG specifications are:&lt;br /&gt;
* Hardware storage for cryptographic keys&lt;br /&gt;
* Secure booting&lt;br /&gt;
* (Remote) Platform Attestation (''meaning that somebody can check the state of your personal computer over the internet'')&lt;br /&gt;
* Sealing (''meaning binding data to a specific platform and application'')&lt;br /&gt;
&lt;br /&gt;
Generally: There are good arguments that these features can be used to improve the security of computer systems. &amp;lt;br /&amp;gt;&lt;br /&gt;
But: Some of these features can already be established by todays smart card supported systems! &lt;br /&gt;
&lt;br /&gt;
Drawback 1: &lt;br /&gt;
Remote Attestation is a good feature to remotely detect tampering of the computer, as long as this 'somebody' is the owner of the platform. &amp;lt;br /&amp;gt; &lt;br /&gt;
But: If this Remote Attestation is used by third parties, serious privacy and market domination issues arise.&lt;br /&gt;
&lt;br /&gt;
Drawback 2: &lt;br /&gt;
There are certainly legitimate reasons for Sealing. &amp;lt;br /&amp;gt;&lt;br /&gt;
But: The main use case seems to be consumer-unfriendly new 'business cases' for content dealers which involve locking down content to a single platform, based on connecting content to a specific device without any migration options. '''This means e.g. if the user wants to use his music to a portable player he should be forced to buy another license. It seems to be doubtful, if customers will enjoy this limitations.''' &lt;br /&gt;
&lt;br /&gt;
In any case the possible problems of giving away control of the personal hardware should be evaluated carefully.&lt;br /&gt;
&lt;br /&gt;
There have also been two important critiques regarding the hardware security of the &amp;quot;Trusted Platform Modules (TPM)&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The first one has been the insuficient security certification against hardware attacks. In TCG 1.2 this critique has been addressed by an improvement of the hardware requirements and it has to be seen how strong the resistance against sophisticated attacks at intensively daily usage will be.&lt;br /&gt;
&lt;br /&gt;
The second one addreses the 'black box'-characterisitcs and therefore 'hidden channels' in the TCG-Hardware. Hidden channels smuggle secret information to third parties and it has been a well known fact for many years, that hidden channels are easy to implement in black box hardware.&lt;br /&gt;
&lt;br /&gt;
=== TCG and Digital 'Restrictions' Management ===&lt;br /&gt;
&lt;br /&gt;
As stated above, the philosophy behind Remote Platform Attestation and Sealing seems to be a protection of the computer system or electronic device ''against'' its user and owner. &lt;br /&gt;
&lt;br /&gt;
What will do this to the use of digital media content on electronic devices? The answer of the IT- and the Entertainment-Industry is &amp;quot;Digital Rights Management&amp;quot; or just shortly &amp;quot;DRM&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
''The DRM component takes control over the rest of the user's device which they rightfully own (e.g. MP3-Player'' '''or a ThinkPad)''' ''and restricts how it may act, regardless of the user's wishes (e.g. preventing the user from copying a song). All forms of DRM depend on the device imposing restrictions that cannot be legally disabled or modified by the user. In other words, the user has no choice.''&lt;br /&gt;
&lt;br /&gt;
So a new 'name' for DRM came up: '''Digital Restrictions Management''' instead of Digital Rights Management. &lt;br /&gt;
&lt;br /&gt;
I cannot go too much into the details here, so please have a look at the [http://en.wikipedia.org/wiki/Digital_rights_management#DRM_opponents article in the Wikipedia Encyclopedia], where I took the quote from. The bold emphasised addition is mine.&lt;br /&gt;
&lt;br /&gt;
=== Censorship and Avoiding Whistle Blowers ===&lt;br /&gt;
&lt;br /&gt;
The Siamese twin of Digital Restriction Management is censorship. '''The same techniques which avoid copying music songs can be used to limit the access to all kinds of documents'''. The combination from DRM and observation hardware (TCG is in your mind?) leads to very dangerous implications.&lt;br /&gt;
&lt;br /&gt;
Giving a real world example, the Chinese government could easily block the use of all documents containing the words &amp;quot;Dalai Lama&amp;quot; on 'trusted' computer systems.&lt;br /&gt;
&lt;br /&gt;
Another application is the fight against whistle blowers. E.g. government documents about the deportation of own citizens to countries with a doubtful law system or about supporting illegal wars could made only readable for government computers and combined with a expiration date. This might make it very dificult for the society or following generations to disclose these breaches of humanity.&lt;br /&gt;
&lt;br /&gt;
=== Open Source Software and TCG === &lt;br /&gt;
&lt;br /&gt;
Since Microsoft controls a overwhelming part of the OS market, it seems to be rather dificult to evaluate the TCG proposal separated from the Palladium project.&lt;br /&gt;
&lt;br /&gt;
TCG versus GPL: At least two companies are researching on &amp;quot;TCG-enhanced&amp;quot; versions of GNU/Linux. According most security researchers it seems to be necessary to evaluate programs which have access to the 'trusted part'. &lt;br /&gt;
&lt;br /&gt;
This has huge implication for the development of free software. Following a possibly expensive evaluation there will be a signature for one program version. &lt;br /&gt;
&lt;br /&gt;
Even if the program stays under GPL every change of the code will make the signature invalid. This seems to be a strong violation of the main philosophy of Open Source software.&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security System (1.0) ===&lt;br /&gt;
&lt;br /&gt;
Embedded Security System (in IBM documents there is no use of the additive version-nummer 1.0) is using the heayvily disputed &amp;quot;TCG 1.1&amp;quot;-specification.&lt;br /&gt;
&lt;br /&gt;
''(Features etc. will soon be added here - your help, support or cooperation is very much appreciated)''&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security System 2.0 ===&lt;br /&gt;
&lt;br /&gt;
The recent TCG-specification is &amp;quot;TCG 1.2&amp;quot; and Embedded Security System 2.0 is supposed to use this newer specification.&lt;br /&gt;
&lt;br /&gt;
''(Features etc. will soon be added here - your help, support or cooperation is very much appreciated)''&lt;br /&gt;
&lt;br /&gt;
=== Summary === &lt;br /&gt;
&lt;br /&gt;
There are still a lot of critical questions, even though TCG 1.2 contains many steps into the right direction. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html 'Trusted Computing' Frequently Asked Questions] - Anti-TC FAQ by Cambridge University security director and professor [[Ross Anderson]].&lt;br /&gt;
*[http://www.againsttcpa.com/ Against-TCPA]&lt;br /&gt;
*[http://invisiblog.com/1c801df4aee49232/article/0df117d5d9b32aea8bc23194ecc270ec Interesting Uses of Trusted Computing]&lt;br /&gt;
*[http://www.gnu.org/philosophy/can-you-trust.html Can you trust your computer?] essay by the FSF&lt;br /&gt;
*[http://www.protectprivacy.org/topic--lang-en.html The civil rights organisation Protect Privacy]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Read more at Wikipedia, the free encyclopedia: ==&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_computing Trusted Computing]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_Computing_Platform_Alliance Trusted Computing Group (formerly known as TCPA)]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Fritz-chip Fritz-Chip]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Palladium_operating_system Palladium]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Cryptography Wikipedia-Category: Cryptography]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Copyright_law Wikipedia-Category: Copyright Law]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Digital_rights_management Wikipedia-Category: Digital Rights Management]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ThinkPad-Models with TCPA: ==&lt;br /&gt;
&lt;br /&gt;
TCPA was introduced as the so called &amp;quot;Embedded Security System&amp;quot; for the first time in the ThinkPad T23 (July 2001). &lt;br /&gt;
&lt;br /&gt;
Almost every ThinkPad, which was build after the T23-Series is equipped with &amp;quot;Embedded Security System&amp;quot; or &amp;quot;Embedded Security System v2.0&amp;quot; - except for the A30-Model (but the A30p has a &amp;quot;Embedded Security System&amp;quot;!!!).&lt;br /&gt;
&lt;br /&gt;
If you want to buy a renewed or used ThinkPad with a Pentium III-CPU, but don't want TCPA inside, than you can choose between A30, every version aof the A22-, A21-, A20-Series.&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=User_talk:Pitsche&amp;diff=16793</id>
		<title>User talk:Pitsche</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=User_talk:Pitsche&amp;diff=16793"/>
		<updated>2005-07-04T09:26:16Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: Thank you, Wyrfel, very good suggestion!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
hello! please add your comments here:&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 19:21, 3 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello,&lt;br /&gt;
&lt;br /&gt;
just had a glimpse at your article. One thing...your introduction to this article in [[Embedded Security Subsystem]] mentions the chip built into current and past ThinkPads. But you do not state anywhere which of the TCG specs are already implemented in this chip. As far as i know remote sealing is not yet possible with it, is it? However, i think there should be a section telling people what ESS 1.0 and ESS 2.0 can do and can't do.&lt;br /&gt;
&lt;br /&gt;
Regards,&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
== Thank you, Wyrfel, very good suggestion! ==&lt;br /&gt;
&lt;br /&gt;
Hello Wyrfel, &lt;br /&gt;
&lt;br /&gt;
thank you very much for you comment, this ia a very good suggestion!&lt;br /&gt;
&lt;br /&gt;
I will start to write something to that.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 11:26, 4 Jul 2005 (CEST)&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Embedded_Security_Subsystem&amp;diff=6100</id>
		<title>Embedded Security Subsystem</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Embedded_Security_Subsystem&amp;diff=6100"/>
		<updated>2005-07-04T09:16:00Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: the A30 is without TCPA, but the A30p is with TCPA&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|style=&amp;quot;vertical-align:top;padding-right:20px;width:10px;&amp;quot; | [[Image:ESS.jpg|IBM Embedded Security Subsystem]] __NOTOC__&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: 0; margin-right:10px; border: 1px solid #dfdfdf; padding: 0em 1em 1em 1em; background-color:#F8F8FF; align:right;&amp;quot;&amp;gt;&lt;br /&gt;
=== The Embedded Security Subsystem ===&lt;br /&gt;
The Embedded Security Subsystem is nothing but a chip installed on the Thinkpads mainboard that can take care of certain security related tasks conforming to the TCPA standard. It was first introduced among the T23 models and is now under the name Embedded Security Subsystem 2.0 an integral part of most of the modern Thinkpads. The functions of the chip are bound to three main groups:&lt;br /&gt;
* public key functions&lt;br /&gt;
* trusted boot functions&lt;br /&gt;
* initialization and management functions&lt;br /&gt;
&lt;br /&gt;
The purpose of the whole thing is to keep the users sensitive data out of range from software based attacks (like viruses, internet attacks etc.). One way the chip offers to achieve this is by providing storage for keys along with the neccessary functions to handle them within itself, so that a i.e. a private key never has to leave the chip (can't be seen by any piece of software). Besides this there are more complex topics covered by the functionality of the chip. If you want to find out more about it you can find good documents on the [http://www.research.ibm.com/gsal/tcpa/ IBM Research TCPA resources page].&lt;br /&gt;
&lt;br /&gt;
[[Trusted or Treacherous]]?&lt;br /&gt;
&lt;br /&gt;
TC - Trusted Computing - will be the biggest change of the information landscape since decades. &lt;br /&gt;
Besides positive features like a more secure hardware storage for cryptographic keys, an analysis of the proposed standards shows some problematic properties. &lt;br /&gt;
'''One of the main problems is that the computer owner is seen as an adversary, who no longer should have the full control over their own computers anymore.'''&lt;br /&gt;
As the Thinkpads of the recent generations following the Thinkpad T23 (except the A30) are equipped with this disputed technology, you have to be aware of the promise and risks inside your ThinkPad - so please read [[Trusted or Treacherous|this article]] about a important topic.&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Linux Support==&lt;br /&gt;
Two linux drivers are available, a [[tpm|classical one]] and a [[tpmdd|newer one]].&lt;br /&gt;
Coverage of functionality of the first is unknown so far, the second is part of a bigger project aiming to provide a usable security framework.&lt;br /&gt;
&lt;br /&gt;
David Stafford (one of the developers of the tpm code at IBM) on March 10, 2005 sent me the most recent version of the tpm-kml code. With his permission, I quote his email:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;I am attaching our latest driver and library.&lt;br /&gt;
This version is in the process of kernel mailing list review, and&lt;br /&gt;
will hopefully be accepted into the official kernel. It works&lt;br /&gt;
much better across various 2.6 kernels. Note that this builds&lt;br /&gt;
three modules tpm, tpm_atmel, and tpm_nsc. You modprobe the&lt;br /&gt;
tpm_atmel (for all current shipping atmel based systems), or&lt;br /&gt;
tpm_nsc (for the coming national based systems).&lt;br /&gt;
&lt;br /&gt;
Also note that there is a conflict with the snd-intel8x0&lt;br /&gt;
kernel module (they each try to grab the LPC bus). You can&lt;br /&gt;
either: load the tpm modules first (such as in initrd or&lt;br /&gt;
rc.sysinit, before sound), or recompile the snd-intel8x0, turning&lt;br /&gt;
off the MIDI and JOYSTICK support. The latest 2.6.11 version&lt;br /&gt;
of snd-intel8x0 also reportedly fixes things.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Compiling this library was easy. Compiling the driver on my 2.6.8-686 (debian testing) laptop failed. But the library works with the driver I compiled from the tpm-2.0 package IBM made available on its pages (see the links below).&lt;br /&gt;
&lt;br /&gt;
Gijs&lt;br /&gt;
&lt;br /&gt;
The T43 requires a patch posted to the LKML by Kylene Jo Hall: [http://marc.theaimsgroup.com/?l=linux-kernel&amp;amp;m=111884603309146&amp;amp;w=2 LKML posting]. An updated patch for linux 2.6.12 is available [http://shamrock.dyndns.org/~ln/linux/tpm_2.6.12.diff here].&lt;br /&gt;
&lt;br /&gt;
==Related Links==&lt;br /&gt;
*[http://www.pc.ibm.com/us/think/thinkvantagetech/security.html IBMs ThinkVantage&amp;lt;sup&amp;gt;TM&amp;lt;/sup&amp;gt; Technologies Embedded Security Subsystem page]&lt;br /&gt;
*[http://www.pc.ibm.com/presentations/us/thinkvantage/56/index.html?shortcut=ess&amp;amp; IBMs ThinkVantage&amp;lt;sup&amp;gt;TM&amp;lt;/sup&amp;gt; Technologies Flash presentation - Embedded Security Subsystem]&lt;br /&gt;
*[http://www.research.ibm.com/gsal/tcpa/ IBM Research TCPA resources page]&lt;br /&gt;
*[http://www.prosec.rub.de/trusted_grub.html Trusted Grub]&lt;br /&gt;
&lt;br /&gt;
==Models featuring this Technology==&lt;br /&gt;
'''IBM Embedded Security Subsystem'''&lt;br /&gt;
*ThinkPad {{R31}}&lt;br /&gt;
*ThinkPad {{T23}}, {{T30}}&lt;br /&gt;
*ThinkPad {{X23}}, {{X24}}&lt;br /&gt;
'''IBM Embedded Security Subsystem 2.0'''&lt;br /&gt;
*ThinkPad {{R32}}, {{R40}}, {{R50}}, {{R50p}}, {{R51}}, {{R52}}&lt;br /&gt;
*ThinkPad {{T40}}, {{T40p}}, {{T41}}, {{T41p}}, {{T42}}, {{T42p}}, {{T43}}, {{T43p}}&lt;br /&gt;
*ThinkPad {{X30}}, {{X31}}, {{X32}}, {{X40}}, {{X41}}, {{X41T}}&lt;br /&gt;
[[Category:Glossary]]&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=User_talk:Pitsche&amp;diff=6101</id>
		<title>User talk:Pitsche</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=User_talk:Pitsche&amp;diff=6101"/>
		<updated>2005-07-03T17:21:29Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: new and minor&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
hello! please add your comments here:&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 19:21, 3 Jul 2005 (CEST)&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=User:Pitsche&amp;diff=6136</id>
		<title>User:Pitsche</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=User:Pitsche&amp;diff=6136"/>
		<updated>2005-07-03T17:20:37Z</updated>

		<summary type="html">&lt;p&gt;Pitsche: new and minor&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;hello this is pitsche. &lt;br /&gt;
&lt;br /&gt;
i wanted to buy a thinkpad, but than i heard about the TCPA- or TCG-Chip inside the models build after 2000.&lt;br /&gt;
&lt;br /&gt;
it took me some days to collect the needed information and hyperlinks, so i want to share all this with you and i hope you like my work and that the hours spend writing it were spent for a good article ;-)&lt;br /&gt;
&lt;br /&gt;
'''if you want to comment on me, please don't do it here, use the &amp;quot;user discussion&amp;quot; instead. thank you! '''&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 19:20, 3 Jul 2005 (CEST)&lt;/div&gt;</summary>
		<author><name>Pitsche</name></author>
		
	</entry>
</feed>