<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.thinkwiki.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Shpedoikal</id>
	<title>ThinkWiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.thinkwiki.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Shpedoikal"/>
	<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/wiki/Special:Contributions/Shpedoikal"/>
	<updated>2026-05-14T02:26:07Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.12</generator>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=8891</id>
		<title>TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=8891"/>
		<updated>2005-07-20T17:58:59Z</updated>

		<summary type="html">&lt;p&gt;Shpedoikal: /* DRM - Digital Rights Management */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|style=&amp;quot;vertical-align:top;padding-right:20px;white-space:nowrap;&amp;quot; | __TOC__&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: 0; margin-right:10px; border: 1px solid #dfdfdf; padding: 0em 1em 1em 1em; background-color:#F8F8FF; align:right;&amp;quot;&amp;gt;The Members of the Trusted Computing Group (TCG), formerly the Trusted Computing Platform Allience (TCPA), are working on a paradigm shift in information technology, which could become the biggest change of the information landscape since decades.&lt;br /&gt;
&lt;br /&gt;
This article tries to gather information about the implications of the TCPA and TCG effords. To many users these implications seem rather treacherous than trustworthy. This article tries to give a short summarized overview over the facts from a rather netral point of view.&lt;br /&gt;
&lt;br /&gt;
We will start with a quote:&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;It is clear that trusted computing hardware provides security benefits, if software is prepared to take advantage of it. But trusted computing has been received skeptically and remains controversial. Some of the controversy is based on misconceptions, but much of it is appropriate, since trusted computing systems fundamentally alter trust relationships. Legitimate concerns about trusted computing are not limited to one area, such as consumer privacy or copyright issues.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''We have at least two serious concerns about trusted computing. First, existing designs are fundamentally flawed because they expose the public to new risks of anti-competitive and anti-consumer behavior. Second, manufacturers of particular &amp;quot;trusted&amp;quot; computers and components may secretly implement them incorrectly.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation]''&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==TC - Trusted Computing==&lt;br /&gt;
Recently, the number of known security incidents has been dramatically increasing. Thus, security issues in computer industry have been pushed forward. So far, digital content on computers couldn't be efficiently protected since every security mechanism accessible by software could always be circumvent by software.&lt;br /&gt;
&lt;br /&gt;
The idea of Trusted Computing is to provide a hardware chip (TPM) that assists software in:&lt;br /&gt;
* secure storage of security related data like keys, certificates, data and checksums&lt;br /&gt;
* encryption and decryption&lt;br /&gt;
* validation of certificates&lt;br /&gt;
* (Remote) Platform Attestation (''meaning that somebody can check the state of your personal computer over the internet'')&lt;br /&gt;
* Sealing (''meaning encrypting data in a state where a specific platform or application may be required to decrypt it'')&lt;br /&gt;
&lt;br /&gt;
Although a TPM will assist in the above operations, software support is required to enable any enforcement of a security policy on a platform with a TPM.  A TPM in and of itself cannot disable any part of your computer.&lt;br /&gt;
&lt;br /&gt;
==A short history of TCPA, TCG, Palladium and NSCB:==&lt;br /&gt;
* 1999: The Trusted Computing Platform Alliance (TCPA) is founded by Intel, Microsoft, HP, Compaq and IBM. &lt;br /&gt;
* February 2002: The TCPA Main Specification Version 1.1b is being published. &lt;br /&gt;
* Early 2003: The name of Microsofts own TC-Projekt &amp;quot;Palladium&amp;quot; is changed to &amp;quot;next-generation secure computing base&amp;quot; (NGSCB).&lt;br /&gt;
* April 2003: The Trusted Computing Group (TCG) is founded by AMD, HP, IBM, Intel and Microsoft.&lt;br /&gt;
* Summer 2004: Microsoft seems to have stopped their &amp;quot;NGSCB&amp;quot;-effort.&lt;br /&gt;
&lt;br /&gt;
==The TCPA==&lt;br /&gt;
Founded 1999 by Compaq, HP, IBM, Intel and Microsoft, the TCPA counts around 200 members by now, among them Adobe, AMD, Fujitsu-Siemens, Gateway, Motorola, Samsung, Toshiba and many others.&lt;br /&gt;
&lt;br /&gt;
==The TCG==&lt;br /&gt;
As successor of the TCPA, the TCG was founded by AMD, HP, IBM, Intel and Microsoft in April 2004.&lt;br /&gt;
&lt;br /&gt;
==TCG Hardware Architecture==&lt;br /&gt;
The Trusted Platform Module (TPM) (a.k.a. &amp;quot;Fritz&amp;quot;-Chip) is the central element of the TCG architecture. Imagine a hardwired smart card for a abstract picture of this architecture.&lt;br /&gt;
&lt;br /&gt;
The integration of the whole functionality into the CPU is also discussed, which would increase resistance against tampering attacks (see also Intel &amp;quot;LaGrande&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Regarding the hardware security of the &amp;quot;Trusted Platform Modules (TPM)&amp;quot;, there were two important critiques:&lt;br /&gt;
*The first one has been the insuficient security certification against hardware attacks. In TCG 1.2 this critique has been addressed by an improvement of the hardware requirements. It has to be seen how strong the resistance against sophisticated attacks at intensively daily usage will be.&lt;br /&gt;
*The second one addreses the 'black box'-characterisitcs and risk 'hidden channels' in the TCG-Hardware, which can be easily implemented and used to send secret information to third parties.&lt;br /&gt;
&lt;br /&gt;
==TC - Treacherous Computing?==&lt;br /&gt;
Generally, there are good arguments that these features can be used to improve the security of computer systems. Trusted Computing offers a lot of features which can be used to protect the personal computer against malicious software and users.  &lt;br /&gt;
&lt;br /&gt;
But according to a lot of technical analysis, most researchers have fundamental critics on the main design considerations. The new infrastructure will offer '''only minor protection against worms and viruses''', although TCG is telling something completely different. Furthermore, some of these features can already be established by todays smart card supported systems, so where is the need for TCG 1.1?&lt;br /&gt;
&lt;br /&gt;
''We recognize that hardware enhancements might be one way to improve computer security. But treating computer owners as adversaries is not progress in computer security. '''The interoperability, competition, owner control, and similar problems inherent in the TCG and NCSCB approach are serious enough that we recommend against adoption of these trusted computing technologies until these problems have been addressed. Fortunately, we believe these problems are not insurmountable''', and we look forward to working with the industry to resolve them.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation], bold emphasis by [[User:Pitsche|Pitsche]]&lt;br /&gt;
&lt;br /&gt;
There are a lot of drawbacks to this kind of security implementation: &lt;br /&gt;
*The concept prevents even the device owner from certain operations. &lt;br /&gt;
*Remote Attestation is a good feature to remotely detect tampering of the computer, as long as this 'somebody' is the owner of the platform. But if this Remote Attestation is used by third parties, serious privacy and market domination issues arise.&lt;br /&gt;
*There are certainly legitimate reasons for Sealing. But the main use case seems to be consumer-unfriendly new 'business cases' for content dealers which involve locking down content to a single platform, based on connecting content to a specific device without any migration options. &lt;br /&gt;
&lt;br /&gt;
Additionally, the market domination of Microsoft, obscurities regarding the needed trust infrastructure and a heap of patents have lead to critical evaluations from cryptographers, privacy organizations and European institutions. &amp;lt;br /&amp;gt;&lt;br /&gt;
Because of this pressure the Trusted Computing Group has modifed its proposal. The recent specification is &amp;quot;TCG 1.2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== DRM - Digital Rights Management ===&lt;br /&gt;
The philosophy behind Remote Platform Attestation and Sealing seems to be a protection of the computer system like a ThinkPad or electronic device like a MP3-Player ''against'' its user and owner.&lt;br /&gt;
&lt;br /&gt;
What will do this to the use of digital media content on computers or other electronic devices? The answer of the IT- and the Entertainment-Industry is &amp;quot;Digital Rights Management&amp;quot; or just shortly &amp;quot;DRM&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
''The DRM component takes control over the rest of the user's device which they rightfully own (e.g. MP3-Player'' '''or a ThinkPad)''' ''and restricts how it may act, regardless of the user's wishes (e.g. preventing the user from copying a song). All forms of DRM depend on the device imposing restrictions that cannot be legally disabled or modified by the user. In other words, the user has no choice.'' Bold emphasised by [[User:Pitsche]].&lt;br /&gt;
&lt;br /&gt;
So a new 'name' for DRM came up: '''Digital Restrictions Management''' instead of Digital Rights Management.&lt;br /&gt;
&lt;br /&gt;
Read more at [[Wikipedia:Digital rights management]].&lt;br /&gt;
&lt;br /&gt;
Keep in mind that neither enabling your TPM or installing [http://trousers.sourceforge.net TrouSerS] will implement any DRM features on your ThinkPad. Other software packages that implement DRM on Linux should be posted here.&lt;br /&gt;
&lt;br /&gt;
=== Censorship and Avoiding Whistle Blowers ===&lt;br /&gt;
The Siamese twin of Digital Restriction Management is censorship. '''The same techniques which avoid copying music songs can be used to limit the access to all kinds of documents'''. The combination of DRM and observation hardware like TCG leads to very dangerous implications.&lt;br /&gt;
&lt;br /&gt;
Giving a real world example, the Chinese government could easily block the use of all documents containing the words &amp;quot;Dalai Lama&amp;quot; on 'trusted' computer systems.&lt;br /&gt;
&lt;br /&gt;
Another application is the fight against whistle blowers. E.g. government documents about the deportation of own citizens to countries with a doubtful law system or about supporting illegal wars could be made readable for government computers only and combined with a expiration date. This might make it very dificult for the society or following generations to disclose these breaches of humanity.&lt;br /&gt;
&lt;br /&gt;
=== Summary === &lt;br /&gt;
There are still a lot of critical questions, even though TCG 1.2 contains many steps into the right direction.&lt;br /&gt;
&lt;br /&gt;
== Thinkpads with and without TCPA/TCG ==&lt;br /&gt;
&lt;br /&gt;
If you want to know, which ThinkPads are equipped with TCPA Technology like IBM Embedded Security Subsystem or IBM Embedded Security Subsystem 2.0 and which of them are TCPA/TCG clean models, please [[Embedded Security Subsystem#Models featuring this Technology|see the complete list of models]] at the article about [[Embedded Security Subsystem]].&lt;br /&gt;
&lt;br /&gt;
== OpenSource Software and TCG == &lt;br /&gt;
The TrouSerS project aims at implementing each TSS (Trusted computing Software Stack) specification as it is released.  TrouSerS is now part of the [http://packages.gentoo.org/packages/?category=app-crypt;name=trousers Gentoo] distribution.&lt;br /&gt;
&lt;br /&gt;
There are many misconceptions surrounding open-source software and trusted computing.  Please see the [http://trousers.sf.net/faq.html TrouSerS FAQ] for answers to some common questions.&lt;br /&gt;
&lt;br /&gt;
== Related Links ==&lt;br /&gt;
*[http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html 'Trusted Computing' Frequently Asked Questions] - Anti-TC FAQ by Cambridge University security director and professor [[Ross Anderson]].&lt;br /&gt;
*[http://www.againsttcpa.com/ Against-TCPA]&lt;br /&gt;
*[http://invisiblog.com/1c801df4aee49232/article/0df117d5d9b32aea8bc23194ecc270ec Interesting Uses of Trusted Computing]&lt;br /&gt;
*[http://www.gnu.org/philosophy/can-you-trust.html Can you trust your computer?] essay by the FSF&lt;br /&gt;
*[http://www.protectprivacy.org/topic--lang-en.html The civil rights organisation Protect Privacy]&lt;br /&gt;
*[http://trousers.sourceforge.net/faq.html The TrouSerS FAQ.]&lt;br /&gt;
&lt;br /&gt;
== Read more at Wikipedia, the free encyclopedia: ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_computing Trusted Computing]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_Computing_Platform_Alliance Trusted Computing Group (formerly known as TCPA)]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Fritz-chip Fritz-Chip]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Palladium_operating_system Palladium]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Cryptography Wikipedia-Category: Cryptography]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Copyright_law Wikipedia-Category: Copyright Law]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Digital_rights_management Wikipedia-Category: Digital Rights Management]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Notes from the original artical that didn't fit so far&lt;br /&gt;
&lt;br /&gt;
Compared to this, positive features like a more secure hardware storage for cryptographic keys seem to be a very small benefit.&lt;br /&gt;
&lt;br /&gt;
:Compared with the TCPA the TCG is less democratic organized and the high membership fees obstruct the possibilities for small companies and non profit organizations to participate.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Microsofts own concept for 'Trustworthy Computing', &amp;quot;Palladium&amp;quot;, is expected to cost some hundreds of million cash.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is all the name changing about? &amp;lt;br /&amp;gt;&lt;br /&gt;
Some say, that the change was a reaction to the negative publicity, because Palladium and TCPA was soon equated with a 'Nineteen Eighty-Four'-Scenario of an 'Orwellian society', the ever-present, all-seeing 'Big Brother' and other privacy issues.&lt;br /&gt;
&lt;br /&gt;
'''This means e.g. if the user wants to use his music to a portable player he should be forced to buy another license. It seems to be doubtful, if customers will enjoy this limitations.'''&lt;br /&gt;
&lt;br /&gt;
In any case the possible problems of giving away control of the personal hardware should be evaluated carefully.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Category:Glossary]]&lt;/div&gt;</summary>
		<author><name>Shpedoikal</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6731</id>
		<title>TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6731"/>
		<updated>2005-07-14T22:48:19Z</updated>

		<summary type="html">&lt;p&gt;Shpedoikal: /* TC - Trusted Computing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|style=&amp;quot;vertical-align:top;padding-right:20px;white-space:nowrap;&amp;quot; | __TOC__&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: 0; margin-right:10px; border: 1px solid #dfdfdf; padding: 0em 1em 1em 1em; background-color:#F8F8FF; align:right;&amp;quot;&amp;gt;The Members of the Trusted Computing Group (TCG), formerly the Trusted Computing Platform Allience (TCPA), are working on a paradigm shift in information technology, which could become the biggest change of the information landscape since decades.&lt;br /&gt;
&lt;br /&gt;
This article tries to gather information about the implications of the TCPA and TCG effords. To many users these implications seem rather treacherous than trustworthy. This article tries to give a short summarized overview over the facts from a rather netral point of view.&lt;br /&gt;
&lt;br /&gt;
We will start with a quote:&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;It is clear that trusted computing hardware provides security benefits, if software is prepared to take advantage of it. But trusted computing has been received skeptically and remains controversial. Some of the controversy is based on misconceptions, but much of it is appropriate, since trusted computing systems fundamentally alter trust relationships. Legitimate concerns about trusted computing are not limited to one area, such as consumer privacy or copyright issues.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''We have at least two serious concerns about trusted computing. First, existing designs are fundamentally flawed because they expose the public to new risks of anti-competitive and anti-consumer behavior. Second, manufacturers of particular &amp;quot;trusted&amp;quot; computers and components may secretly implement them incorrectly.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation]''&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==TC - Trusted Computing==&lt;br /&gt;
Recently, the number of known security incidents has been dramatically increasing. Thus, security issues in computer industry have been pushed forward. So far, digital content on computers couldn't be efficiently protected since every security mechanism accessible by software could always be circumvent by software.&lt;br /&gt;
&lt;br /&gt;
The idea of Trusted Computing is to provide a hardware chip (TPM) that assists software in:&lt;br /&gt;
* secure storage of security related data like keys, certificates, data and checksums&lt;br /&gt;
* encryption and decryption&lt;br /&gt;
* validation of certificates&lt;br /&gt;
* (Remote) Platform Attestation (''meaning that somebody can check the state of your personal computer over the internet'')&lt;br /&gt;
* Sealing (''meaning encrypting data in a state where a specific platform or application may be required to decrypt it'')&lt;br /&gt;
&lt;br /&gt;
Although a TPM will assist in the above operations, software support is required to enable any enforcement of a security policy on a platform with a TPM.  A TPM in and of itself cannot disable any part of your computer.&lt;br /&gt;
&lt;br /&gt;
==A short history of TCPA, TCG, Palladium and NSCB:==&lt;br /&gt;
* 1999: The Trusted Computing Platform Alliance (TCPA) is founded by Intel, Microsoft, HP, Compaq and IBM. &lt;br /&gt;
* February 2002: The TCPA Main Specification Version 1.1b is being published. &lt;br /&gt;
* Early 2003: The name of Microsofts own TC-Projekt &amp;quot;Palladium&amp;quot; is changed to &amp;quot;next-generation secure computing base&amp;quot; (NGSCB).&lt;br /&gt;
* April 2003: The Trusted Computing Group (TCG) is founded by AMD, HP, IBM, Intel and Microsoft.&lt;br /&gt;
* Summer 2004: Microsoft seems to have stopped their &amp;quot;NGSCB&amp;quot;-effort.&lt;br /&gt;
&lt;br /&gt;
==The TCPA==&lt;br /&gt;
Founded 1999 by Compaq, HP, IBM, Intel and Microsoft, the TCPA counts around 200 members by now, among them Adobe, AMD, Fujitsu-Siemens, Gateway, Motorola, Samsung, Toshiba and many others.&lt;br /&gt;
&lt;br /&gt;
==The TCG==&lt;br /&gt;
As successor of the TCPA, the TCG was founded by AMD, HP, IBM, Intel and Microsoft in April 2004.&lt;br /&gt;
&lt;br /&gt;
==TCG Hardware Architecture==&lt;br /&gt;
The Trusted Platform Module (TPM) (a.k.a. &amp;quot;Fritz&amp;quot;-Chip) is the central element of the TCG architecture. Imagine a hardwired smart card for a abstract picture of this architecture.&lt;br /&gt;
&lt;br /&gt;
The integration of the whole functionality into the CPU is also discussed, which would increase resistance against tampering attacks (see also Intel &amp;quot;LaGrande&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Regarding the hardware security of the &amp;quot;Trusted Platform Modules (TPM)&amp;quot;, there were two important critiques:&lt;br /&gt;
*The first one has been the insuficient security certification against hardware attacks. In TCG 1.2 this critique has been addressed by an improvement of the hardware requirements. It has to be seen how strong the resistance against sophisticated attacks at intensively daily usage will be.&lt;br /&gt;
*The second one addreses the 'black box'-characterisitcs and risk 'hidden channels' in the TCG-Hardware, which can be easily implemented and used to send secret information to third parties.&lt;br /&gt;
&lt;br /&gt;
==TC - Treacherous Computing?==&lt;br /&gt;
Generally, there are good arguments that these features can be used to improve the security of computer systems. Trusted Computing offers a lot of features which can be used to protect the personal computer against malicious software and users.  &lt;br /&gt;
&lt;br /&gt;
But according to a lot of technical analysis, most researchers have fundamental critics on the main design considerations. The new infrastructure will offer '''only minor protection against worms and viruses''', although TCG is telling something completely different. Furthermore, some of these features can already be established by todays smart card supported systems, so where is the need for TCG 1.1?&lt;br /&gt;
&lt;br /&gt;
''We recognize that hardware enhancements might be one way to improve computer security. But treating computer owners as adversaries is not progress in computer security. '''The interoperability, competition, owner control, and similar problems inherent in the TCG and NCSCB approach are serious enough that we recommend against adoption of these trusted computing technologies until these problems have been addressed. Fortunately, we believe these problems are not insurmountable''', and we look forward to working with the industry to resolve them.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation], bold emphasis by [[User:Pitsche|Pitsche]]&lt;br /&gt;
&lt;br /&gt;
There are a lot of drawbacks to this kind of security implementation: &lt;br /&gt;
*The concept prevents even the device owner from certain operations. &lt;br /&gt;
*Remote Attestation is a good feature to remotely detect tampering of the computer, as long as this 'somebody' is the owner of the platform. But if this Remote Attestation is used by third parties, serious privacy and market domination issues arise.&lt;br /&gt;
*There are certainly legitimate reasons for Sealing. But the main use case seems to be consumer-unfriendly new 'business cases' for content dealers which involve locking down content to a single platform, based on connecting content to a specific device without any migration options. &lt;br /&gt;
&lt;br /&gt;
Additionally, the market domination of Microsoft, obscurities regarding the needed trust infrastructure and a heap of patents have lead to critical evaluations from cryptographers, privacy organizations and European institutions. &amp;lt;br /&amp;gt;&lt;br /&gt;
Because of this pressure the Trusted Computing Group has modifed its proposal. The recent specification is &amp;quot;TCG 1.2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== DRM - Digital Rights Management ===&lt;br /&gt;
The philosophy behind Remote Platform Attestation and Sealing seems to be a protection of the computer system like a ThinkPad or electronic device like a MP3-Player ''against'' its user and owner.&lt;br /&gt;
&lt;br /&gt;
What will do this to the use of digital media content on computers or other electronic devices? The answer of the IT- and the Entertainment-Industry is &amp;quot;Digital Rights Management&amp;quot; or just shortly &amp;quot;DRM&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
''The DRM component takes control over the rest of the user's device which they rightfully own (e.g. MP3-Player'' '''or a ThinkPad)''' ''and restricts how it may act, regardless of the user's wishes (e.g. preventing the user from copying a song). All forms of DRM depend on the device imposing restrictions that cannot be legally disabled or modified by the user. In other words, the user has no choice.'' Bold emphasised by [[User:Pitsche]].&lt;br /&gt;
&lt;br /&gt;
So a new 'name' for DRM came up: '''Digital Restrictions Management''' instead of Digital Rights Management.&lt;br /&gt;
&lt;br /&gt;
Read more at [[Wikipedia:Digital rights management]].&lt;br /&gt;
&lt;br /&gt;
=== Censorship and Avoiding Whistle Blowers ===&lt;br /&gt;
The Siamese twin of Digital Restriction Management is censorship. '''The same techniques which avoid copying music songs can be used to limit the access to all kinds of documents'''. The combination of DRM and observation hardware like TCG leads to very dangerous implications.&lt;br /&gt;
&lt;br /&gt;
Giving a real world example, the Chinese government could easily block the use of all documents containing the words &amp;quot;Dalai Lama&amp;quot; on 'trusted' computer systems.&lt;br /&gt;
&lt;br /&gt;
Another application is the fight against whistle blowers. E.g. government documents about the deportation of own citizens to countries with a doubtful law system or about supporting illegal wars could be made readable for government computers only and combined with a expiration date. This might make it very dificult for the society or following generations to disclose these breaches of humanity.&lt;br /&gt;
&lt;br /&gt;
=== Summary === &lt;br /&gt;
There are still a lot of critical questions, even though TCG 1.2 contains many steps into the right direction.&lt;br /&gt;
&lt;br /&gt;
== Thinkpads with and without TCPA/TCG ==&lt;br /&gt;
&lt;br /&gt;
If you want to know, which ThinkPads are equipped with TCPA Technology like IBM Embedded Security Subsystem or IBM Embedded Security Subsystem 2.0 and which of them are TCPA/TCG clean models, please [[Embedded Security Subsystem#Models featuring this Technology|see the complete list of models]] at the article about [[Embedded Security Subsystem]].&lt;br /&gt;
&lt;br /&gt;
== OpenSource Software and TCG == &lt;br /&gt;
The TrouSerS project aims at implementing each TSS (Trusted computing Software Stack) specification as it is released.  TrouSerS is now part of the [http://packages.gentoo.org/packages/?category=app-crypt;name=trousers Gentoo] distribution.&lt;br /&gt;
&lt;br /&gt;
There are many misconceptions surrounding open-source software and trusted computing.  Please see the [http://trousers.sf.net/faq.html TrouSerS FAQ] for answers to some common questions.&lt;br /&gt;
&lt;br /&gt;
== Related Links ==&lt;br /&gt;
*[http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html 'Trusted Computing' Frequently Asked Questions] - Anti-TC FAQ by Cambridge University security director and professor [[Ross Anderson]].&lt;br /&gt;
*[http://www.againsttcpa.com/ Against-TCPA]&lt;br /&gt;
*[http://invisiblog.com/1c801df4aee49232/article/0df117d5d9b32aea8bc23194ecc270ec Interesting Uses of Trusted Computing]&lt;br /&gt;
*[http://www.gnu.org/philosophy/can-you-trust.html Can you trust your computer?] essay by the FSF&lt;br /&gt;
*[http://www.protectprivacy.org/topic--lang-en.html The civil rights organisation Protect Privacy]&lt;br /&gt;
*[http://trousers.sourceforge.net/faq.html The TrouSerS FAQ.]&lt;br /&gt;
&lt;br /&gt;
== Read more at Wikipedia, the free encyclopedia: ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_computing Trusted Computing]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_Computing_Platform_Alliance Trusted Computing Group (formerly known as TCPA)]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Fritz-chip Fritz-Chip]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Palladium_operating_system Palladium]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Cryptography Wikipedia-Category: Cryptography]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Copyright_law Wikipedia-Category: Copyright Law]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Digital_rights_management Wikipedia-Category: Digital Rights Management]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Notes from the original artical that didn't fit so far&lt;br /&gt;
&lt;br /&gt;
Compared to this, positive features like a more secure hardware storage for cryptographic keys seem to be a very small benefit.&lt;br /&gt;
&lt;br /&gt;
:Compared with the TCPA the TCG is less democratic organized and the high membership fees obstruct the possibilities for small companies and non profit organizations to participate.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Microsofts own concept for 'Trustworthy Computing', &amp;quot;Palladium&amp;quot;, is expected to cost some hundreds of million cash.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is all the name changing about? &amp;lt;br /&amp;gt;&lt;br /&gt;
Some say, that the change was a reaction to the negative publicity, because Palladium and TCPA was soon equated with a 'Nineteen Eighty-Four'-Scenario of an 'Orwellian society', the ever-present, all-seeing 'Big Brother' and other privacy issues.&lt;br /&gt;
&lt;br /&gt;
'''This means e.g. if the user wants to use his music to a portable player he should be forced to buy another license. It seems to be doubtful, if customers will enjoy this limitations.'''&lt;br /&gt;
&lt;br /&gt;
In any case the possible problems of giving away control of the personal hardware should be evaluated carefully.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Category:Glossary]]&lt;/div&gt;</summary>
		<author><name>Shpedoikal</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6605</id>
		<title>TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6605"/>
		<updated>2005-07-14T16:23:09Z</updated>

		<summary type="html">&lt;p&gt;Shpedoikal: /* OpenSource Software and TCG */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|style=&amp;quot;vertical-align:top;padding-right:20px;white-space:nowrap;&amp;quot; | __TOC__&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: 0; margin-right:10px; border: 1px solid #dfdfdf; padding: 0em 1em 1em 1em; background-color:#F8F8FF; align:right;&amp;quot;&amp;gt;The Members of the Trusted Computing Group (TCG), formerly the Trusted Computing Platform Allience (TCPA), are working on a paradigm shift in information technology, which could become the biggest change of the information landscape since decades.&lt;br /&gt;
&lt;br /&gt;
This article tries to gather information about the implications of the TCPA and TCG effords. To many users these implications seem rather treacherous than trustworthy. This article tries to give a short summarized overview over the facts from a rather netral point of view.&lt;br /&gt;
&lt;br /&gt;
We will start with a quote:&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;It is clear that trusted computing hardware provides security benefits, if software is prepared to take advantage of it. But trusted computing has been received skeptically and remains controversial. Some of the controversy is based on misconceptions, but much of it is appropriate, since trusted computing systems fundamentally alter trust relationships. Legitimate concerns about trusted computing are not limited to one area, such as consumer privacy or copyright issues.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''We have at least two serious concerns about trusted computing. First, existing designs are fundamentally flawed because they expose the public to new risks of anti-competitive and anti-consumer behavior. Second, manufacturers of particular &amp;quot;trusted&amp;quot; computers and components may secretly implement them incorrectly.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation]''&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==TC - Trusted Computing==&lt;br /&gt;
Recently, the number of known security incidents has been dramatically increasing. Thus, security issues in computer industry have been pushed forward. So far, digital content on computers couldn't be efficiently protected since every security mechanism accessible by software could always be circumvent by software.&lt;br /&gt;
&lt;br /&gt;
The idea of Trusted Computing is to provide a hardware layer that cares for&lt;br /&gt;
* storage of security related data like keys, certificates and checksums&lt;br /&gt;
* encryption and decryption&lt;br /&gt;
* validation of certificates&lt;br /&gt;
* (Remote) Platform Attestation (''meaning that somebody can check the state of your personal computer over the internet'')&lt;br /&gt;
* Sealing (''meaning binding data to a specific platform and application'')&lt;br /&gt;
&lt;br /&gt;
Since this way the hardware can handle security management without any software being able to access the security data (like a Black Box). Moreover, the whole software layer can be 'monitored' by the hardware through the use of checksums. Hence the TCPA layer can recognise changes to the software layer and block the whole system from starting, this way keeping malicious software from running at all.&lt;br /&gt;
&lt;br /&gt;
==A short history of TCPA, TCG, Palladium and NSCB:==&lt;br /&gt;
* 1999: The Trusted Computing Platform Alliance (TCPA) is founded by Intel, Microsoft, HP, Compaq and IBM. &lt;br /&gt;
* February 2002: The TCPA Main Specification Version 1.1b is being published. &lt;br /&gt;
* Early 2003: The name of Microsofts own TC-Projekt &amp;quot;Palladium&amp;quot; is changed to &amp;quot;next-generation secure computing base&amp;quot; (NGSCB).&lt;br /&gt;
* April 2003: The Trusted Computing Group (TCG) is founded by AMD, HP, IBM, Intel and Microsoft.&lt;br /&gt;
* Summer 2004: Microsoft seems to have stopped their &amp;quot;NGSCB&amp;quot;-effort.&lt;br /&gt;
&lt;br /&gt;
==The TCPA==&lt;br /&gt;
Founded 1999 by Compaq, HP, IBM, Intel and Microsoft, the TCPA counts around 200 members by now, among them Adobe, AMD, Fujitsu-Siemens, Gateway, Motorola, Samsung, Toshiba and many others.&lt;br /&gt;
&lt;br /&gt;
==The TCG==&lt;br /&gt;
As successor of the TCPA, the TCG was founded by AMD, HP, IBM, Intel and Microsoft in April 2004.&lt;br /&gt;
&lt;br /&gt;
==TCG Hardware Architecture==&lt;br /&gt;
The Trusted Platform Module (TPM) (a.k.a. &amp;quot;Fritz&amp;quot;-Chip) is the central element of the TCG architecture. Imagine a hardwired smart card for a abstract picture of this architecture.&lt;br /&gt;
&lt;br /&gt;
The integration of the whole functionality into the CPU is also discussed, which would increase resistance against tampering attacks (see also Intel &amp;quot;LaGrande&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Regarding the hardware security of the &amp;quot;Trusted Platform Modules (TPM)&amp;quot;, there were two important critiques:&lt;br /&gt;
*The first one has been the insuficient security certification against hardware attacks. In TCG 1.2 this critique has been addressed by an improvement of the hardware requirements. It has to be seen how strong the resistance against sophisticated attacks at intensively daily usage will be.&lt;br /&gt;
*The second one addreses the 'black box'-characterisitcs and risk 'hidden channels' in the TCG-Hardware, which can be easily implemented and used to send secret information to third parties.&lt;br /&gt;
&lt;br /&gt;
==TC - Treacherous Computing?==&lt;br /&gt;
Generally, there are good arguments that these features can be used to improve the security of computer systems. Trusted Computing offers a lot of features which can be used to protect the personal computer against malicious software and users.  &lt;br /&gt;
&lt;br /&gt;
But according to a lot of technical analysis, most researchers have fundamental critics on the main design considerations. The new infrastructure will offer '''only minor protection against worms and viruses''', although TCG is telling something completely different. Furthermore, some of these features can already be established by todays smart card supported systems, so where is the need for TCG 1.1?&lt;br /&gt;
&lt;br /&gt;
''We recognize that hardware enhancements might be one way to improve computer security. But treating computer owners as adversaries is not progress in computer security. '''The interoperability, competition, owner control, and similar problems inherent in the TCG and NCSCB approach are serious enough that we recommend against adoption of these trusted computing technologies until these problems have been addressed. Fortunately, we believe these problems are not insurmountable''', and we look forward to working with the industry to resolve them.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation], bold emphasis by [[User:Pitsche|Pitsche]]&lt;br /&gt;
&lt;br /&gt;
There are a lot of drawbacks to this kind of security implementation: &lt;br /&gt;
*The concept prevents even the device owner from certain operations. &lt;br /&gt;
*Remote Attestation is a good feature to remotely detect tampering of the computer, as long as this 'somebody' is the owner of the platform. But if this Remote Attestation is used by third parties, serious privacy and market domination issues arise.&lt;br /&gt;
*There are certainly legitimate reasons for Sealing. But the main use case seems to be consumer-unfriendly new 'business cases' for content dealers which involve locking down content to a single platform, based on connecting content to a specific device without any migration options. &lt;br /&gt;
&lt;br /&gt;
Additionally, the market domination of Microsoft, obscurities regarding the needed trust infrastructure and a heap of patents have lead to critical evaluations from cryptographers, privacy organizations and European institutions. &amp;lt;br /&amp;gt;&lt;br /&gt;
Because of this pressure the Trusted Computing Group has modifed its proposal. The recent specification is &amp;quot;TCG 1.2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== DRM - Digital Rights Management ===&lt;br /&gt;
The philosophy behind Remote Platform Attestation and Sealing seems to be a protection of the computer system like a ThinkPad or electronic device like a MP3-Player ''against'' its user and owner.&lt;br /&gt;
&lt;br /&gt;
What will do this to the use of digital media content on computers or other electronic devices? The answer of the IT- and the Entertainment-Industry is &amp;quot;Digital Rights Management&amp;quot; or just shortly &amp;quot;DRM&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
''The DRM component takes control over the rest of the user's device which they rightfully own (e.g. MP3-Player'' '''or a ThinkPad)''' ''and restricts how it may act, regardless of the user's wishes (e.g. preventing the user from copying a song). All forms of DRM depend on the device imposing restrictions that cannot be legally disabled or modified by the user. In other words, the user has no choice.'' Bold emphasised by [[User:Pitsche]].&lt;br /&gt;
&lt;br /&gt;
So a new 'name' for DRM came up: '''Digital Restrictions Management''' instead of Digital Rights Management.&lt;br /&gt;
&lt;br /&gt;
Read more at [[Wikipedia:Digital rights management]].&lt;br /&gt;
&lt;br /&gt;
=== Censorship and Avoiding Whistle Blowers ===&lt;br /&gt;
The Siamese twin of Digital Restriction Management is censorship. '''The same techniques which avoid copying music songs can be used to limit the access to all kinds of documents'''. The combination of DRM and observation hardware like TCG leads to very dangerous implications.&lt;br /&gt;
&lt;br /&gt;
Giving a real world example, the Chinese government could easily block the use of all documents containing the words &amp;quot;Dalai Lama&amp;quot; on 'trusted' computer systems.&lt;br /&gt;
&lt;br /&gt;
Another application is the fight against whistle blowers. E.g. government documents about the deportation of own citizens to countries with a doubtful law system or about supporting illegal wars could be made readable for government computers only and combined with a expiration date. This might make it very dificult for the society or following generations to disclose these breaches of humanity.&lt;br /&gt;
&lt;br /&gt;
=== Summary === &lt;br /&gt;
There are still a lot of critical questions, even though TCG 1.2 contains many steps into the right direction.&lt;br /&gt;
&lt;br /&gt;
== Thinkpads with and without TCPA/TCG ==&lt;br /&gt;
&lt;br /&gt;
If you want to know, which ThinkPads are equipped with TCPA Technology like IBM Embedded Security Subsystem or IBM Embedded Security Subsystem 2.0 and which of them are TCPA/TCG clean models, please [[Embedded Security Subsystem#Models featuring this Technology|see the complete list of models]] at the article about [[Embedded Security Subsystem]].&lt;br /&gt;
&lt;br /&gt;
== OpenSource Software and TCG == &lt;br /&gt;
The TrouSerS project aims at implementing each TSS (Trusted computing Software Stack) specification as it is released.  TrouSerS is now part of the [http://packages.gentoo.org/packages/?category=app-crypt;name=trousers Gentoo] distribution.&lt;br /&gt;
&lt;br /&gt;
There are many misconceptions surrounding open-source software and trusted computing.  Please see the [http://trousers.sf.net/faq.html TrouSerS FAQ] for answers to some common questions.&lt;br /&gt;
&lt;br /&gt;
== Related Links ==&lt;br /&gt;
*[http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html 'Trusted Computing' Frequently Asked Questions] - Anti-TC FAQ by Cambridge University security director and professor [[Ross Anderson]].&lt;br /&gt;
*[http://www.againsttcpa.com/ Against-TCPA]&lt;br /&gt;
*[http://invisiblog.com/1c801df4aee49232/article/0df117d5d9b32aea8bc23194ecc270ec Interesting Uses of Trusted Computing]&lt;br /&gt;
*[http://www.gnu.org/philosophy/can-you-trust.html Can you trust your computer?] essay by the FSF&lt;br /&gt;
*[http://www.protectprivacy.org/topic--lang-en.html The civil rights organisation Protect Privacy]&lt;br /&gt;
*[http://trousers.sourceforge.net/faq.html The TrouSerS FAQ.]&lt;br /&gt;
&lt;br /&gt;
== Read more at Wikipedia, the free encyclopedia: ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_computing Trusted Computing]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_Computing_Platform_Alliance Trusted Computing Group (formerly known as TCPA)]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Fritz-chip Fritz-Chip]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Palladium_operating_system Palladium]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Cryptography Wikipedia-Category: Cryptography]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Copyright_law Wikipedia-Category: Copyright Law]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Digital_rights_management Wikipedia-Category: Digital Rights Management]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Notes from the original artical that didn't fit so far&lt;br /&gt;
&lt;br /&gt;
Compared to this, positive features like a more secure hardware storage for cryptographic keys seem to be a very small benefit.&lt;br /&gt;
&lt;br /&gt;
:Compared with the TCPA the TCG is less democratic organized and the high membership fees obstruct the possibilities for small companies and non profit organizations to participate.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Microsofts own concept for 'Trustworthy Computing', &amp;quot;Palladium&amp;quot;, is expected to cost some hundreds of million cash.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is all the name changing about? &amp;lt;br /&amp;gt;&lt;br /&gt;
Some say, that the change was a reaction to the negative publicity, because Palladium and TCPA was soon equated with a 'Nineteen Eighty-Four'-Scenario of an 'Orwellian society', the ever-present, all-seeing 'Big Brother' and other privacy issues.&lt;br /&gt;
&lt;br /&gt;
'''This means e.g. if the user wants to use his music to a portable player he should be forced to buy another license. It seems to be doubtful, if customers will enjoy this limitations.'''&lt;br /&gt;
&lt;br /&gt;
In any case the possible problems of giving away control of the personal hardware should be evaluated carefully.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Category:Glossary]]&lt;/div&gt;</summary>
		<author><name>Shpedoikal</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6810</id>
		<title>Talk:TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6810"/>
		<updated>2005-07-14T16:15:53Z</updated>

		<summary type="html">&lt;p&gt;Shpedoikal: /* Not sure where to begin... */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Discussion about the article &amp;quot;Trusted or Treacherous&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
Please add you comments here. &lt;br /&gt;
&lt;br /&gt;
You can use the &amp;quot;Plus&amp;quot;(+)-Button next to the &amp;quot;edit&amp;quot;-button at the top of this page to add you comments at the right spot ;-)&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 11:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Plagiarism? ==&lt;br /&gt;
&lt;br /&gt;
Large parts of this article apparently consist of unattributed, near-verbatim excerpts from a SANE2004 paper by Weis, Lucks, and Bogk, [http://www.cryptolabs.org/CCC2004TCunendlich/WeisLucksBogkSane2004tcg12.pdf TCG 1.2 - fair play with the 'Fritz' chip?]. Regardless of whether one believes that general political/ethical concerns about Trusted Computing belong on a Thinkpad-specific site, wholesale copying of unidentified, and presumably copyrighted, material is not cool, and could get the whole project in trouble.&lt;br /&gt;
&lt;br /&gt;
I would suggest that the non-original parts of this article be removed and replaced by an external link to the above-mentioned paper; any particularly crucial short excerpts (as permitted by &amp;quot;fair use&amp;quot;) should be clearly identified as such. The specific information about how the TCG specifications are implemented on various Thinkpad models can stay, of course.&lt;br /&gt;
&lt;br /&gt;
== The Source is under Creative Commons, isn't it? ==&lt;br /&gt;
&lt;br /&gt;
Hello Andrzej,&lt;br /&gt;
&lt;br /&gt;
yes, you are right, another version of this text on a website of the presentation of the annual chaos computer club is one of my sources, but I think, that one is under creative commons license by-nc-sa 2.0 de. And are the presentations of the chaos computer congress not also free unless the speakers don't want it??????&lt;br /&gt;
&lt;br /&gt;
This license allows to copy, distribute, display, perform or modify the text as long as it is published under exactly the same creative commons license and licensees may not use the work for commercial purposes - unless they get the licensor's permission.&lt;br /&gt;
&lt;br /&gt;
My problem was, I had a lot more sources in a different language than english and my first drafts were way to long!&lt;br /&gt;
&lt;br /&gt;
It didn't worked to keep it that short but detailed, as Ruediger and Adreas wrote it.&lt;br /&gt;
&lt;br /&gt;
But if you think, after my explanation the actual version is still problematic, I will delete it of course!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:12, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
If the original authors have explicitly published the text under a suitably permissive CC license, there should be no legal problem in using it in a ThinkWiki article. Even in that case, however, the source needs to be clearly identified, and there should be a link to the complete original article.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Okay Andrzej, I will work on that and tell all of you about it in the coming days, if I have enough time for it.&lt;br /&gt;
&lt;br /&gt;
Unless that, feel free to take out the critical passages of the article or modify it, if you have the time and if you want to do it.&lt;br /&gt;
&lt;br /&gt;
But there is a problem: I slightly changed the text, put two sentence together to one etc. How can I now cite the source?&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
No problem; just say that your ThinkWiki article is ''based on'' the Weis et al. paper, and give a reference. The parts of their text that you include don't have to be verbatim copies; indeed, the whole point is that you are creating a ''derived work'' (e.g., by bringing in material from other sources), which they supposedly explicitly allow in the CC license. To be on the safe side, you should probably also include a link to a web page documenting that the original text is indeed freely licensed, or say that you have personally obtained permission from the authors.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;br /&gt;
----&lt;br /&gt;
Agreed. There should be a general statement in the article about the source the article is derived from, or rather sources - i seem to have used different sources of information for some of my edits. ;-) I'll add mine on next edit.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
== Thanks for your work, i like it ==&lt;br /&gt;
&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
thank you very much for editing and restructering of that article.&lt;br /&gt;
&lt;br /&gt;
I think, I know know what you and Andrzej want and I will try in he next days, to change the article in that way, okay?&lt;br /&gt;
&lt;br /&gt;
P.S.: I don't know, why I loose my logged-in status from time to time, perhaps my connection. I am sorry, that there are IP-Adresses instead of my unsername &amp;quot;pitsche&amp;quot;, I hope, no one gets confused, which edit is by me and which one by someone else :-o&lt;br /&gt;
&lt;br /&gt;
Sorry.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:15, 4 Jul 2005 (CEST)&lt;br /&gt;
----&lt;br /&gt;
About your login status: ThinkWiki doesn't cache logins. This means everytime your connection breaks or your browser closes you will have to login again. But don't worry, we can figure out what's from you and if not - it's a Wiki. ;-) I'm doing a lot of edits without being logged in as well.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
----&lt;br /&gt;
== No exact TCG specifications needed ==&lt;br /&gt;
&lt;br /&gt;
Hello again!&lt;br /&gt;
&lt;br /&gt;
I am against writing about the specific specifications, because it will make the article longer and everybody, who is '''really''' interested in the specifications has several possibilities to get it for free in the WWW or from Cryptolabs.org or from the CCC.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:22, 4 Jul 2005 (CEST)&lt;br /&gt;
----&lt;br /&gt;
I think the TCG specifications should appear there somewhere. At least at current state of my knowledge about the subject i'd think that having them there is helpful for the user to understand what ESS 1 and 2 are capable of. Of course we shouldn't post the whole specs, but some really compressed summary, similar to the 'feature-list' in &amp;quot;TC - Trusted Computing&amp;quot;. Pitsche, if you could point me to them i could do it. Also, a link to the original TCPA specs would be good. The links themselves should be added to the Links section.&lt;br /&gt;
&lt;br /&gt;
That's it so far...i like the way we work on this.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
----&lt;br /&gt;
One more thing...&lt;br /&gt;
&lt;br /&gt;
I think the TCPA implementation in current ThinkPads is pretty harmless. At least at it's current software state. You just don't use it (respectively don't install the supporting software layer) and it never gets active. One interesting aspect of finding out what the chip is capable of is if it could be forced to be used by later software upgrades or not.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Wyrfel! &lt;br /&gt;
&lt;br /&gt;
I also like the way we work on this article. I think, their will be a improvement in the end, that makes everybody happy and is interesting for the users of the ThinkWiki. &lt;br /&gt;
&lt;br /&gt;
Now to your comments:&lt;br /&gt;
&lt;br /&gt;
# I deleted the 'exact' TCG-Specifications, because there is a paragraph about ESS 1.0 and ESS 2.0, where I think the informations should be placed about how much TCG is in ESS, &amp;quot;what ESS 1 and 2 are capable of&amp;quot;  and &amp;quot;if it could be forced to be used by later software upgrades or not&amp;quot; (qutoes from you). Correct me if I am wrong, but otherwiese it would be included two times in the article. Or am I making a mistake here?&lt;br /&gt;
# I agree with you: At least one hyperlink to the TCG-Specifications should be included in the &amp;quot;Related Links&amp;quot; (right now it is No. 9 in the Table Of Contents). Perhaps on wednesday or thursday I will do this...&lt;br /&gt;
# I don't know, if the TCPA implementation in current ThinkPads is pretty harmless. I understood Ruediger and Andreas in their presentation at the 21. Chaos Communication Congress very different to that, because the were referring almost only to IBM and Microsoft.  &amp;lt;br /&amp;gt;&lt;br /&gt;
:It might be a rhetorical technique to fascinate their audience and to keep them awake and following. But my impression of them both was, that they are very concerned scientist (or at least CCC-Activists), who really see the current TCG-Implementations that problematic. And I also felt that they don't need to panic the people just for getting more attention and that they would'nt be disappointed, if they could turn their attention to something else and did'nt have to fight against TCPA/TCG/Palladium :-)&lt;br /&gt;
&lt;br /&gt;
P.S.: Effeff, well, how do I say this, hmmm, does anybody know, where I can find a list of 'common market prices' in USD or Euro for used ThinkPads? &lt;br /&gt;
&lt;br /&gt;
Perhaps something like this [http://www.macnews.de/index.php?_mcnpage=6760 www.macnews.de/index.php?_mcnpage=6760] ???? &amp;quot;Jehova, Jehova, Jeh- outch!&amp;quot; ;-)&lt;br /&gt;
&lt;br /&gt;
Background: I was offered a not so much used ThinkPad A30 with a SXGA+ - TFT-Display without any pixelerrors, but some problems at the drive slot at the right side. Specs of it are: CPU 1.0 Ghz, RAM 512 MB, HDD original IBM 60 GB with 5400 rpm and CD-RW/DVD-ROM-Combo drive...&lt;br /&gt;
&lt;br /&gt;
I have much difficulty for naming a price, because I am not familiar with the cost of repairing that drive slot. At eBay I found some A30p around 600,- Euro and a A22p for 529,- Euro -- is the A30 between? :-o &lt;br /&gt;
&lt;br /&gt;
Thanks!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 01:37, 5 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== a bit paranoid? ==&lt;br /&gt;
&lt;br /&gt;
1) The [[Embedded Security Subsystem]] page already contains a list of ThinkPad's that &amp;lt;u&amp;gt;might&amp;lt;/u&amp;gt; have the security chip, no need to start listing older machines that predate it.&lt;br /&gt;
&lt;br /&gt;
2) And noticed how I said &amp;lt;u&amp;gt;might&amp;lt;/u&amp;gt;, because some of the ThinkPads listed had the security chip as a feature that was not available on every model in the range. You can see this on the individual ThinkPad product pages, as it will say that it was available &amp;lt;i&amp;gt;on select models&amp;lt;/i&amp;gt;. So for example it is perfectly possible to get a second-hand R40, T40 or X31 without the chip. If you want to know the exact type-model of machines with or without the securitychip, look at tawbook.pdf or trwbook.pdf&lt;br /&gt;
&lt;br /&gt;
3) To my knowledge, the chip is disabled by default on every machine that has it, you need to manually enable it in the BIOS first. I have three ThinkPads currently, two have the security chip, and neither Windows or Linux is able to detect it in the disabled state.&lt;br /&gt;
&lt;br /&gt;
4) Ironically Linux actually has better support for it then windows out-of-the-box. The latest Linux kernels have a driver for it, while MS is not shipping anything that supports it, and will not for some time.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Mr. &amp;quot;67.87.7.65&amp;quot;,&lt;br /&gt;
&lt;br /&gt;
thanks for your comments, much appreciated.&lt;br /&gt;
&lt;br /&gt;
TC can be a good thing, but what TCG (formerly TCPA) wants, can't be a good thing at all and that has nothing to do with paranoia. At least I hope I am not paranoid, just critical about every marketing phrase :-)&lt;br /&gt;
&lt;br /&gt;
I am sorry, if you got the impression, that the ThinkPad models with E.S.S. 1.0 or 2.0 are treacherous. To be honest, I don't have a ThinkPad (not yet) and therefore I can't see for myself, how and what TCG-specs are implemented.&lt;br /&gt;
&lt;br /&gt;
As stated before, Ruediger and Andreas were mostly talking about IBM and MS in their presentation at the 21. Chaos Communication Congress in December 2004 and they seem to talk about this topic for some years now, not only at the congress.&lt;br /&gt;
&lt;br /&gt;
Other sources together with their presentation at 21C3 let me come to the conclusion, that you can't belive the statements of the TCG and their members concerning your (cyber) civil rights and your right of freedom of choice as user and owner of degitial devices such as laptops equipped with a 'Fritz'-chip.&lt;br /&gt;
&lt;br /&gt;
I thought, the article about E.S.S. was a little bit too superficial and the dispute and the critics were not mentionend at all. The EMbedded Security Subsystem sounded like a fantastic thing, that every laptop building and selling company should implement. But why was IBM using that new name and not 'Fritz'-chip or TCG or TCPA? Guess why... :-)&lt;br /&gt;
&lt;br /&gt;
On the other side, my article was / is very much about the dispute and the critics. Okay. Perhaps I can shorten this a litte bit more, add some stuff from the TCG in it (like Wyrfel asked for) etc.&lt;br /&gt;
&lt;br /&gt;
And I have a suggestion to make: &lt;br /&gt;
&lt;br /&gt;
'''How about putting the list of &amp;quot;TCPA/TCG clean models&amp;quot; into the E.S.S.-article and leaving &amp;quot;Trusted or Treacherous&amp;quot; to talk only about Trusted Computing, the TCG-sepcs and the dispute about that specs and giving the readers the hyperlinks so that they can make a judgement by their own???'''&lt;br /&gt;
&lt;br /&gt;
ThinkWiki would be free of that 'conflict', the copied text paragraphs would be gone, the discussion could end, etc.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 12:16, 6 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Yepp, we could do that - leave the list of ESS featured ThinkPads on the ESS page. I think we don't even need the 'clean'-list, since it is just every ThinkPad that doesn't have it. ;-)&lt;br /&gt;
&lt;br /&gt;
However, i agree to &amp;quot;67.87.7.65&amp;quot; ;-) in his impression. He's right about that even of the ESS featured models, some don't have the chip. He's also right about that with the current implementation in ThinkPads you are pretty free to choose using it or not using it. Hence it's a feature. As i see it trouble arises from different sides... the software and the law. These both could eventually force you using it. However, i think there's no need to by a A30 or whatever, just because it doesn't feature that chip. You can buy any other ThinkPad, never enable the chip and be happy. What this article is good for, however, is to make people concious about both, what it really can do, and what privacy and security risks are involved with it.&lt;br /&gt;
&lt;br /&gt;
And BTW, i think that your assumtion of IBM using the ESS name instead of TCG/TCPA to confuse people is a little paranoid. ;-) Look at any IBM page about the ESS and you'll find the words &amp;quot;TCG compliant&amp;quot; within the first sentences, linking to the TCG page. Being suspicious is good, but don't give in to speculations too much.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
no, no, don't get me worng please. The new name by IBM is not to confuse people, but to have it copyrighted and stuff like that.&lt;br /&gt;
&lt;br /&gt;
Gues why IBM is calling it UltraBay, Dell is calling it MediaBay and FixBay and the third Company I forgot the name of is calling it SelectBay? &lt;br /&gt;
&lt;br /&gt;
Because they want to keep the rights of their names / marketing phrases and don't want to pay license fees to the competitors. &lt;br /&gt;
&lt;br /&gt;
For example even the Nike Logo (called &amp;quot;swoosh&amp;quot;) is protected due to heavy brand pirating in developing countires and china.&lt;br /&gt;
&lt;br /&gt;
Sniff, I am *not* paranoid.&lt;br /&gt;
&lt;br /&gt;
(-:&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:26, 6 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi, ok, ok. That's just what i think, but when you originally posted it it sounded like a reference to the TCPA/TCG releated name changes. I'm glad that you're not paranoid. ;-) Wyrfel.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Not sure where to begin... ==&lt;br /&gt;
&lt;br /&gt;
Hi, I started to edit the Open-Source Software section, but then realized that I'd basically end up deleting it, and didn't want that w/o discussion.&lt;br /&gt;
&lt;br /&gt;
There's no certification process for trusted computing applications at all, anywhere. Right now, you can write an app using trousers, the Trusted Computing Software Stack for Linux, and distribute it as widely as you'd like. Everyone with a TPM would be able to use it on Linux w/o restrictions, just like any other app.&lt;br /&gt;
&lt;br /&gt;
In other sections of the doc, there is discussion on how difficult it is to separate Palladium and TC. This should not be difficult at all...  Palladium is a massive set of technologies built on top of a TSS Stack for windows.  Right now, very few apps have been written for Linux and its TSS.&lt;br /&gt;
&lt;br /&gt;
ALso, how can I get my thinkwiki username to appear after my posts?&lt;br /&gt;
Thanks, shpedoikal&lt;br /&gt;
----&lt;br /&gt;
Hi, if you are logged in, you can use &amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt; at the end of your posts. It will be replaced by your user name and a date stamp. Or you just write it manually.&lt;br /&gt;
&lt;br /&gt;
Concerning the OpenSource-Section...i think this section being here offers us two things to fill it with: statements about OpenSource projects dealing with TC like TrouSerS and notes about the threat that technics like remote attestation would incline.&lt;br /&gt;
&lt;br /&gt;
Wyrfel&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Ok, I'll make some changes...&lt;br /&gt;
&lt;br /&gt;
[[User:Shpedoikal|shpedoikal]] 18:15, 14 Jul 2005 (CEST)&lt;/div&gt;</summary>
		<author><name>Shpedoikal</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6543</id>
		<title>Talk:TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6543"/>
		<updated>2005-07-13T22:21:57Z</updated>

		<summary type="html">&lt;p&gt;Shpedoikal: /* Not sure where to begin... */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Discussion about the article &amp;quot;Trusted or Treacherous&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
Please add you comments here. &lt;br /&gt;
&lt;br /&gt;
You can use the &amp;quot;Plus&amp;quot;(+)-Button next to the &amp;quot;edit&amp;quot;-button at the top of this page to add you comments at the right spot ;-)&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 11:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Plagiarism? ==&lt;br /&gt;
&lt;br /&gt;
Large parts of this article apparently consist of unattributed, near-verbatim excerpts from a SANE2004 paper by Weis, Lucks, and Bogk, [http://www.cryptolabs.org/CCC2004TCunendlich/WeisLucksBogkSane2004tcg12.pdf TCG 1.2 - fair play with the 'Fritz' chip?]. Regardless of whether one believes that general political/ethical concerns about Trusted Computing belong on a Thinkpad-specific site, wholesale copying of unidentified, and presumably copyrighted, material is not cool, and could get the whole project in trouble.&lt;br /&gt;
&lt;br /&gt;
I would suggest that the non-original parts of this article be removed and replaced by an external link to the above-mentioned paper; any particularly crucial short excerpts (as permitted by &amp;quot;fair use&amp;quot;) should be clearly identified as such. The specific information about how the TCG specifications are implemented on various Thinkpad models can stay, of course.&lt;br /&gt;
&lt;br /&gt;
== The Source is under Creative Commons, isn't it? ==&lt;br /&gt;
&lt;br /&gt;
Hello Andrzej,&lt;br /&gt;
&lt;br /&gt;
yes, you are right, another version of this text on a website of the presentation of the annual chaos computer club is one of my sources, but I think, that one is under creative commons license by-nc-sa 2.0 de. And are the presentations of the chaos computer congress not also free unless the speakers don't want it??????&lt;br /&gt;
&lt;br /&gt;
This license allows to copy, distribute, display, perform or modify the text as long as it is published under exactly the same creative commons license and licensees may not use the work for commercial purposes - unless they get the licensor's permission.&lt;br /&gt;
&lt;br /&gt;
My problem was, I had a lot more sources in a different language than english and my first drafts were way to long!&lt;br /&gt;
&lt;br /&gt;
It didn't worked to keep it that short but detailed, as Ruediger and Adreas wrote it.&lt;br /&gt;
&lt;br /&gt;
But if you think, after my explanation the actual version is still problematic, I will delete it of course!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:12, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
If the original authors have explicitly published the text under a suitably permissive CC license, there should be no legal problem in using it in a ThinkWiki article. Even in that case, however, the source needs to be clearly identified, and there should be a link to the complete original article.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Okay Andrzej, I will work on that and tell all of you about it in the coming days, if I have enough time for it.&lt;br /&gt;
&lt;br /&gt;
Unless that, feel free to take out the critical passages of the article or modify it, if you have the time and if you want to do it.&lt;br /&gt;
&lt;br /&gt;
But there is a problem: I slightly changed the text, put two sentence together to one etc. How can I now cite the source?&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
No problem; just say that your ThinkWiki article is ''based on'' the Weis et al. paper, and give a reference. The parts of their text that you include don't have to be verbatim copies; indeed, the whole point is that you are creating a ''derived work'' (e.g., by bringing in material from other sources), which they supposedly explicitly allow in the CC license. To be on the safe side, you should probably also include a link to a web page documenting that the original text is indeed freely licensed, or say that you have personally obtained permission from the authors.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;br /&gt;
----&lt;br /&gt;
Agreed. There should be a general statement in the article about the source the article is derived from, or rather sources - i seem to have used different sources of information for some of my edits. ;-) I'll add mine on next edit.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
== Thanks for your work, i like it ==&lt;br /&gt;
&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
thank you very much for editing and restructering of that article.&lt;br /&gt;
&lt;br /&gt;
I think, I know know what you and Andrzej want and I will try in he next days, to change the article in that way, okay?&lt;br /&gt;
&lt;br /&gt;
P.S.: I don't know, why I loose my logged-in status from time to time, perhaps my connection. I am sorry, that there are IP-Adresses instead of my unsername &amp;quot;pitsche&amp;quot;, I hope, no one gets confused, which edit is by me and which one by someone else :-o&lt;br /&gt;
&lt;br /&gt;
Sorry.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:15, 4 Jul 2005 (CEST)&lt;br /&gt;
----&lt;br /&gt;
About your login status: ThinkWiki doesn't cache logins. This means everytime your connection breaks or your browser closes you will have to login again. But don't worry, we can figure out what's from you and if not - it's a Wiki. ;-) I'm doing a lot of edits without being logged in as well.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
----&lt;br /&gt;
== No exact TCG specifications needed ==&lt;br /&gt;
&lt;br /&gt;
Hello again!&lt;br /&gt;
&lt;br /&gt;
I am against writing about the specific specifications, because it will make the article longer and everybody, who is '''really''' interested in the specifications has several possibilities to get it for free in the WWW or from Cryptolabs.org or from the CCC.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:22, 4 Jul 2005 (CEST)&lt;br /&gt;
----&lt;br /&gt;
I think the TCG specifications should appear there somewhere. At least at current state of my knowledge about the subject i'd think that having them there is helpful for the user to understand what ESS 1 and 2 are capable of. Of course we shouldn't post the whole specs, but some really compressed summary, similar to the 'feature-list' in &amp;quot;TC - Trusted Computing&amp;quot;. Pitsche, if you could point me to them i could do it. Also, a link to the original TCPA specs would be good. The links themselves should be added to the Links section.&lt;br /&gt;
&lt;br /&gt;
That's it so far...i like the way we work on this.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
----&lt;br /&gt;
One more thing...&lt;br /&gt;
&lt;br /&gt;
I think the TCPA implementation in current ThinkPads is pretty harmless. At least at it's current software state. You just don't use it (respectively don't install the supporting software layer) and it never gets active. One interesting aspect of finding out what the chip is capable of is if it could be forced to be used by later software upgrades or not.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Wyrfel! &lt;br /&gt;
&lt;br /&gt;
I also like the way we work on this article. I think, their will be a improvement in the end, that makes everybody happy and is interesting for the users of the ThinkWiki. &lt;br /&gt;
&lt;br /&gt;
Now to your comments:&lt;br /&gt;
&lt;br /&gt;
# I deleted the 'exact' TCG-Specifications, because there is a paragraph about ESS 1.0 and ESS 2.0, where I think the informations should be placed about how much TCG is in ESS, &amp;quot;what ESS 1 and 2 are capable of&amp;quot;  and &amp;quot;if it could be forced to be used by later software upgrades or not&amp;quot; (qutoes from you). Correct me if I am wrong, but otherwiese it would be included two times in the article. Or am I making a mistake here?&lt;br /&gt;
# I agree with you: At least one hyperlink to the TCG-Specifications should be included in the &amp;quot;Related Links&amp;quot; (right now it is No. 9 in the Table Of Contents). Perhaps on wednesday or thursday I will do this...&lt;br /&gt;
# I don't know, if the TCPA implementation in current ThinkPads is pretty harmless. I understood Ruediger and Andreas in their presentation at the 21. Chaos Communication Congress very different to that, because the were referring almost only to IBM and Microsoft.  &amp;lt;br /&amp;gt;&lt;br /&gt;
:It might be a rhetorical technique to fascinate their audience and to keep them awake and following. But my impression of them both was, that they are very concerned scientist (or at least CCC-Activists), who really see the current TCG-Implementations that problematic. And I also felt that they don't need to panic the people just for getting more attention and that they would'nt be disappointed, if they could turn their attention to something else and did'nt have to fight against TCPA/TCG/Palladium :-)&lt;br /&gt;
&lt;br /&gt;
P.S.: Effeff, well, how do I say this, hmmm, does anybody know, where I can find a list of 'common market prices' in USD or Euro for used ThinkPads? &lt;br /&gt;
&lt;br /&gt;
Perhaps something like this [http://www.macnews.de/index.php?_mcnpage=6760 www.macnews.de/index.php?_mcnpage=6760] ???? &amp;quot;Jehova, Jehova, Jeh- outch!&amp;quot; ;-)&lt;br /&gt;
&lt;br /&gt;
Background: I was offered a not so much used ThinkPad A30 with a SXGA+ - TFT-Display without any pixelerrors, but some problems at the drive slot at the right side. Specs of it are: CPU 1.0 Ghz, RAM 512 MB, HDD original IBM 60 GB with 5400 rpm and CD-RW/DVD-ROM-Combo drive...&lt;br /&gt;
&lt;br /&gt;
I have much difficulty for naming a price, because I am not familiar with the cost of repairing that drive slot. At eBay I found some A30p around 600,- Euro and a A22p for 529,- Euro -- is the A30 between? :-o &lt;br /&gt;
&lt;br /&gt;
Thanks!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 01:37, 5 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== a bit paranoid? ==&lt;br /&gt;
&lt;br /&gt;
1) The [[Embedded Security Subsystem]] page already contains a list of ThinkPad's that &amp;lt;u&amp;gt;might&amp;lt;/u&amp;gt; have the security chip, no need to start listing older machines that predate it.&lt;br /&gt;
&lt;br /&gt;
2) And noticed how I said &amp;lt;u&amp;gt;might&amp;lt;/u&amp;gt;, because some of the ThinkPads listed had the security chip as a feature that was not available on every model in the range. You can see this on the individual ThinkPad product pages, as it will say that it was available &amp;lt;i&amp;gt;on select models&amp;lt;/i&amp;gt;. So for example it is perfectly possible to get a second-hand R40, T40 or X31 without the chip. If you want to know the exact type-model of machines with or without the securitychip, look at tawbook.pdf or trwbook.pdf&lt;br /&gt;
&lt;br /&gt;
3) To my knowledge, the chip is disabled by default on every machine that has it, you need to manually enable it in the BIOS first. I have three ThinkPads currently, two have the security chip, and neither Windows or Linux is able to detect it in the disabled state.&lt;br /&gt;
&lt;br /&gt;
4) Ironically Linux actually has better support for it then windows out-of-the-box. The latest Linux kernels have a driver for it, while MS is not shipping anything that supports it, and will not for some time.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Mr. &amp;quot;67.87.7.65&amp;quot;,&lt;br /&gt;
&lt;br /&gt;
thanks for your comments, much appreciated.&lt;br /&gt;
&lt;br /&gt;
TC can be a good thing, but what TCG (formerly TCPA) wants, can't be a good thing at all and that has nothing to do with paranoia. At least I hope I am not paranoid, just critical about every marketing phrase :-)&lt;br /&gt;
&lt;br /&gt;
I am sorry, if you got the impression, that the ThinkPad models with E.S.S. 1.0 or 2.0 are treacherous. To be honest, I don't have a ThinkPad (not yet) and therefore I can't see for myself, how and what TCG-specs are implemented.&lt;br /&gt;
&lt;br /&gt;
As stated before, Ruediger and Andreas were mostly talking about IBM and MS in their presentation at the 21. Chaos Communication Congress in December 2004 and they seem to talk about this topic for some years now, not only at the congress.&lt;br /&gt;
&lt;br /&gt;
Other sources together with their presentation at 21C3 let me come to the conclusion, that you can't belive the statements of the TCG and their members concerning your (cyber) civil rights and your right of freedom of choice as user and owner of degitial devices such as laptops equipped with a 'Fritz'-chip.&lt;br /&gt;
&lt;br /&gt;
I thought, the article about E.S.S. was a little bit too superficial and the dispute and the critics were not mentionend at all. The EMbedded Security Subsystem sounded like a fantastic thing, that every laptop building and selling company should implement. But why was IBM using that new name and not 'Fritz'-chip or TCG or TCPA? Guess why... :-)&lt;br /&gt;
&lt;br /&gt;
On the other side, my article was / is very much about the dispute and the critics. Okay. Perhaps I can shorten this a litte bit more, add some stuff from the TCG in it (like Wyrfel asked for) etc.&lt;br /&gt;
&lt;br /&gt;
And I have a suggestion to make: &lt;br /&gt;
&lt;br /&gt;
'''How about putting the list of &amp;quot;TCPA/TCG clean models&amp;quot; into the E.S.S.-article and leaving &amp;quot;Trusted or Treacherous&amp;quot; to talk only about Trusted Computing, the TCG-sepcs and the dispute about that specs and giving the readers the hyperlinks so that they can make a judgement by their own???'''&lt;br /&gt;
&lt;br /&gt;
ThinkWiki would be free of that 'conflict', the copied text paragraphs would be gone, the discussion could end, etc.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 12:16, 6 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Yepp, we could do that - leave the list of ESS featured ThinkPads on the ESS page. I think we don't even need the 'clean'-list, since it is just every ThinkPad that doesn't have it. ;-)&lt;br /&gt;
&lt;br /&gt;
However, i agree to &amp;quot;67.87.7.65&amp;quot; ;-) in his impression. He's right about that even of the ESS featured models, some don't have the chip. He's also right about that with the current implementation in ThinkPads you are pretty free to choose using it or not using it. Hence it's a feature. As i see it trouble arises from different sides... the software and the law. These both could eventually force you using it. However, i think there's no need to by a A30 or whatever, just because it doesn't feature that chip. You can buy any other ThinkPad, never enable the chip and be happy. What this article is good for, however, is to make people concious about both, what it really can do, and what privacy and security risks are involved with it.&lt;br /&gt;
&lt;br /&gt;
And BTW, i think that your assumtion of IBM using the ESS name instead of TCG/TCPA to confuse people is a little paranoid. ;-) Look at any IBM page about the ESS and you'll find the words &amp;quot;TCG compliant&amp;quot; within the first sentences, linking to the TCG page. Being suspicious is good, but don't give in to speculations too much.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
no, no, don't get me worng please. The new name by IBM is not to confuse people, but to have it copyrighted and stuff like that.&lt;br /&gt;
&lt;br /&gt;
Gues why IBM is calling it UltraBay, Dell is calling it MediaBay and FixBay and the third Company I forgot the name of is calling it SelectBay? &lt;br /&gt;
&lt;br /&gt;
Because they want to keep the rights of their names / marketing phrases and don't want to pay license fees to the competitors. &lt;br /&gt;
&lt;br /&gt;
For example even the Nike Logo (called &amp;quot;swoosh&amp;quot;) is protected due to heavy brand pirating in developing countires and china.&lt;br /&gt;
&lt;br /&gt;
Sniff, I am *not* paranoid.&lt;br /&gt;
&lt;br /&gt;
(-:&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:26, 6 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi, ok, ok. That's just what i think, but when you originally posted it it sounded like a reference to the TCPA/TCG releated name changes. I'm glad that you're not paranoid. ;-) Wyrfel.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Not sure where to begin... ==&lt;br /&gt;
&lt;br /&gt;
Hi, I started to edit the Open-Source Software section, but then realized that I'd basically end up deleting it, and didn't want that w/o discussion.&lt;br /&gt;
&lt;br /&gt;
There's no certification process for trusted computing applications at all, anywhere. Right now, you can write an app using trousers, the Trusted Computing Software Stack for Linux, and distribute it as widely as you'd like. Everyone with a TPM would be able to use it on Linux w/o restrictions, just like any other app.&lt;br /&gt;
&lt;br /&gt;
In other sections of the doc, there is discussion on how difficult it is to separate Palladium and TC. This should not be difficult at all...  Palladium is a massive set of technologies built on top of a TSS Stack for windows.  Right now, very few apps have been written for Linux and its TSS.&lt;br /&gt;
&lt;br /&gt;
ALso, how can I get my thinkwiki username to appear after my posts?&lt;br /&gt;
Thanks, shpedoikal&lt;/div&gt;</summary>
		<author><name>Shpedoikal</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6534</id>
		<title>Talk:TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6534"/>
		<updated>2005-07-13T22:04:46Z</updated>

		<summary type="html">&lt;p&gt;Shpedoikal: No sure where to begin...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Discussion about the article &amp;quot;Trusted or Treacherous&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
Please add you comments here. &lt;br /&gt;
&lt;br /&gt;
You can use the &amp;quot;Plus&amp;quot;(+)-Button next to the &amp;quot;edit&amp;quot;-button at the top of this page to add you comments at the right spot ;-)&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 11:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== Plagiarism? ==&lt;br /&gt;
&lt;br /&gt;
Large parts of this article apparently consist of unattributed, near-verbatim excerpts from a SANE2004 paper by Weis, Lucks, and Bogk, [http://www.cryptolabs.org/CCC2004TCunendlich/WeisLucksBogkSane2004tcg12.pdf TCG 1.2 - fair play with the 'Fritz' chip?]. Regardless of whether one believes that general political/ethical concerns about Trusted Computing belong on a Thinkpad-specific site, wholesale copying of unidentified, and presumably copyrighted, material is not cool, and could get the whole project in trouble.&lt;br /&gt;
&lt;br /&gt;
I would suggest that the non-original parts of this article be removed and replaced by an external link to the above-mentioned paper; any particularly crucial short excerpts (as permitted by &amp;quot;fair use&amp;quot;) should be clearly identified as such. The specific information about how the TCG specifications are implemented on various Thinkpad models can stay, of course.&lt;br /&gt;
&lt;br /&gt;
== The Source is under Creative Commons, isn't it? ==&lt;br /&gt;
&lt;br /&gt;
Hello Andrzej,&lt;br /&gt;
&lt;br /&gt;
yes, you are right, another version of this text on a website of the presentation of the annual chaos computer club is one of my sources, but I think, that one is under creative commons license by-nc-sa 2.0 de. And are the presentations of the chaos computer congress not also free unless the speakers don't want it??????&lt;br /&gt;
&lt;br /&gt;
This license allows to copy, distribute, display, perform or modify the text as long as it is published under exactly the same creative commons license and licensees may not use the work for commercial purposes - unless they get the licensor's permission.&lt;br /&gt;
&lt;br /&gt;
My problem was, I had a lot more sources in a different language than english and my first drafts were way to long!&lt;br /&gt;
&lt;br /&gt;
It didn't worked to keep it that short but detailed, as Ruediger and Adreas wrote it.&lt;br /&gt;
&lt;br /&gt;
But if you think, after my explanation the actual version is still problematic, I will delete it of course!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:12, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
If the original authors have explicitly published the text under a suitably permissive CC license, there should be no legal problem in using it in a ThinkWiki article. Even in that case, however, the source needs to be clearly identified, and there should be a link to the complete original article.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Okay Andrzej, I will work on that and tell all of you about it in the coming days, if I have enough time for it.&lt;br /&gt;
&lt;br /&gt;
Unless that, feel free to take out the critical passages of the article or modify it, if you have the time and if you want to do it.&lt;br /&gt;
&lt;br /&gt;
But there is a problem: I slightly changed the text, put two sentence together to one etc. How can I now cite the source?&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:38, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
No problem; just say that your ThinkWiki article is ''based on'' the Weis et al. paper, and give a reference. The parts of their text that you include don't have to be verbatim copies; indeed, the whole point is that you are creating a ''derived work'' (e.g., by bringing in material from other sources), which they supposedly explicitly allow in the CC license. To be on the safe side, you should probably also include a link to a web page documenting that the original text is indeed freely licensed, or say that you have personally obtained permission from the authors.&lt;br /&gt;
&lt;br /&gt;
-- Andrzej&lt;br /&gt;
----&lt;br /&gt;
Agreed. There should be a general statement in the article about the source the article is derived from, or rather sources - i seem to have used different sources of information for some of my edits. ;-) I'll add mine on next edit.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
== Thanks for your work, i like it ==&lt;br /&gt;
&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
thank you very much for editing and restructering of that article.&lt;br /&gt;
&lt;br /&gt;
I think, I know know what you and Andrzej want and I will try in he next days, to change the article in that way, okay?&lt;br /&gt;
&lt;br /&gt;
P.S.: I don't know, why I loose my logged-in status from time to time, perhaps my connection. I am sorry, that there are IP-Adresses instead of my unsername &amp;quot;pitsche&amp;quot;, I hope, no one gets confused, which edit is by me and which one by someone else :-o&lt;br /&gt;
&lt;br /&gt;
Sorry.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:15, 4 Jul 2005 (CEST)&lt;br /&gt;
----&lt;br /&gt;
About your login status: ThinkWiki doesn't cache logins. This means everytime your connection breaks or your browser closes you will have to login again. But don't worry, we can figure out what's from you and if not - it's a Wiki. ;-) I'm doing a lot of edits without being logged in as well.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
----&lt;br /&gt;
== No exact TCG specifications needed ==&lt;br /&gt;
&lt;br /&gt;
Hello again!&lt;br /&gt;
&lt;br /&gt;
I am against writing about the specific specifications, because it will make the article longer and everybody, who is '''really''' interested in the specifications has several possibilities to get it for free in the WWW or from Cryptolabs.org or from the CCC.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:22, 4 Jul 2005 (CEST)&lt;br /&gt;
----&lt;br /&gt;
I think the TCG specifications should appear there somewhere. At least at current state of my knowledge about the subject i'd think that having them there is helpful for the user to understand what ESS 1 and 2 are capable of. Of course we shouldn't post the whole specs, but some really compressed summary, similar to the 'feature-list' in &amp;quot;TC - Trusted Computing&amp;quot;. Pitsche, if you could point me to them i could do it. Also, a link to the original TCPA specs would be good. The links themselves should be added to the Links section.&lt;br /&gt;
&lt;br /&gt;
That's it so far...i like the way we work on this.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
----&lt;br /&gt;
One more thing...&lt;br /&gt;
&lt;br /&gt;
I think the TCPA implementation in current ThinkPads is pretty harmless. At least at it's current software state. You just don't use it (respectively don't install the supporting software layer) and it never gets active. One interesting aspect of finding out what the chip is capable of is if it could be forced to be used by later software upgrades or not.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Wyrfel! &lt;br /&gt;
&lt;br /&gt;
I also like the way we work on this article. I think, their will be a improvement in the end, that makes everybody happy and is interesting for the users of the ThinkWiki. &lt;br /&gt;
&lt;br /&gt;
Now to your comments:&lt;br /&gt;
&lt;br /&gt;
# I deleted the 'exact' TCG-Specifications, because there is a paragraph about ESS 1.0 and ESS 2.0, where I think the informations should be placed about how much TCG is in ESS, &amp;quot;what ESS 1 and 2 are capable of&amp;quot;  and &amp;quot;if it could be forced to be used by later software upgrades or not&amp;quot; (qutoes from you). Correct me if I am wrong, but otherwiese it would be included two times in the article. Or am I making a mistake here?&lt;br /&gt;
# I agree with you: At least one hyperlink to the TCG-Specifications should be included in the &amp;quot;Related Links&amp;quot; (right now it is No. 9 in the Table Of Contents). Perhaps on wednesday or thursday I will do this...&lt;br /&gt;
# I don't know, if the TCPA implementation in current ThinkPads is pretty harmless. I understood Ruediger and Andreas in their presentation at the 21. Chaos Communication Congress very different to that, because the were referring almost only to IBM and Microsoft.  &amp;lt;br /&amp;gt;&lt;br /&gt;
:It might be a rhetorical technique to fascinate their audience and to keep them awake and following. But my impression of them both was, that they are very concerned scientist (or at least CCC-Activists), who really see the current TCG-Implementations that problematic. And I also felt that they don't need to panic the people just for getting more attention and that they would'nt be disappointed, if they could turn their attention to something else and did'nt have to fight against TCPA/TCG/Palladium :-)&lt;br /&gt;
&lt;br /&gt;
P.S.: Effeff, well, how do I say this, hmmm, does anybody know, where I can find a list of 'common market prices' in USD or Euro for used ThinkPads? &lt;br /&gt;
&lt;br /&gt;
Perhaps something like this [http://www.macnews.de/index.php?_mcnpage=6760 www.macnews.de/index.php?_mcnpage=6760] ???? &amp;quot;Jehova, Jehova, Jeh- outch!&amp;quot; ;-)&lt;br /&gt;
&lt;br /&gt;
Background: I was offered a not so much used ThinkPad A30 with a SXGA+ - TFT-Display without any pixelerrors, but some problems at the drive slot at the right side. Specs of it are: CPU 1.0 Ghz, RAM 512 MB, HDD original IBM 60 GB with 5400 rpm and CD-RW/DVD-ROM-Combo drive...&lt;br /&gt;
&lt;br /&gt;
I have much difficulty for naming a price, because I am not familiar with the cost of repairing that drive slot. At eBay I found some A30p around 600,- Euro and a A22p for 529,- Euro -- is the A30 between? :-o &lt;br /&gt;
&lt;br /&gt;
Thanks!&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 01:37, 5 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== a bit paranoid? ==&lt;br /&gt;
&lt;br /&gt;
1) The [[Embedded Security Subsystem]] page already contains a list of ThinkPad's that &amp;lt;u&amp;gt;might&amp;lt;/u&amp;gt; have the security chip, no need to start listing older machines that predate it.&lt;br /&gt;
&lt;br /&gt;
2) And noticed how I said &amp;lt;u&amp;gt;might&amp;lt;/u&amp;gt;, because some of the ThinkPads listed had the security chip as a feature that was not available on every model in the range. You can see this on the individual ThinkPad product pages, as it will say that it was available &amp;lt;i&amp;gt;on select models&amp;lt;/i&amp;gt;. So for example it is perfectly possible to get a second-hand R40, T40 or X31 without the chip. If you want to know the exact type-model of machines with or without the securitychip, look at tawbook.pdf or trwbook.pdf&lt;br /&gt;
&lt;br /&gt;
3) To my knowledge, the chip is disabled by default on every machine that has it, you need to manually enable it in the BIOS first. I have three ThinkPads currently, two have the security chip, and neither Windows or Linux is able to detect it in the disabled state.&lt;br /&gt;
&lt;br /&gt;
4) Ironically Linux actually has better support for it then windows out-of-the-box. The latest Linux kernels have a driver for it, while MS is not shipping anything that supports it, and will not for some time.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Mr. &amp;quot;67.87.7.65&amp;quot;,&lt;br /&gt;
&lt;br /&gt;
thanks for your comments, much appreciated.&lt;br /&gt;
&lt;br /&gt;
TC can be a good thing, but what TCG (formerly TCPA) wants, can't be a good thing at all and that has nothing to do with paranoia. At least I hope I am not paranoid, just critical about every marketing phrase :-)&lt;br /&gt;
&lt;br /&gt;
I am sorry, if you got the impression, that the ThinkPad models with E.S.S. 1.0 or 2.0 are treacherous. To be honest, I don't have a ThinkPad (not yet) and therefore I can't see for myself, how and what TCG-specs are implemented.&lt;br /&gt;
&lt;br /&gt;
As stated before, Ruediger and Andreas were mostly talking about IBM and MS in their presentation at the 21. Chaos Communication Congress in December 2004 and they seem to talk about this topic for some years now, not only at the congress.&lt;br /&gt;
&lt;br /&gt;
Other sources together with their presentation at 21C3 let me come to the conclusion, that you can't belive the statements of the TCG and their members concerning your (cyber) civil rights and your right of freedom of choice as user and owner of degitial devices such as laptops equipped with a 'Fritz'-chip.&lt;br /&gt;
&lt;br /&gt;
I thought, the article about E.S.S. was a little bit too superficial and the dispute and the critics were not mentionend at all. The EMbedded Security Subsystem sounded like a fantastic thing, that every laptop building and selling company should implement. But why was IBM using that new name and not 'Fritz'-chip or TCG or TCPA? Guess why... :-)&lt;br /&gt;
&lt;br /&gt;
On the other side, my article was / is very much about the dispute and the critics. Okay. Perhaps I can shorten this a litte bit more, add some stuff from the TCG in it (like Wyrfel asked for) etc.&lt;br /&gt;
&lt;br /&gt;
And I have a suggestion to make: &lt;br /&gt;
&lt;br /&gt;
'''How about putting the list of &amp;quot;TCPA/TCG clean models&amp;quot; into the E.S.S.-article and leaving &amp;quot;Trusted or Treacherous&amp;quot; to talk only about Trusted Computing, the TCG-sepcs and the dispute about that specs and giving the readers the hyperlinks so that they can make a judgement by their own???'''&lt;br /&gt;
&lt;br /&gt;
ThinkWiki would be free of that 'conflict', the copied text paragraphs would be gone, the discussion could end, etc.&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 12:16, 6 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Yepp, we could do that - leave the list of ESS featured ThinkPads on the ESS page. I think we don't even need the 'clean'-list, since it is just every ThinkPad that doesn't have it. ;-)&lt;br /&gt;
&lt;br /&gt;
However, i agree to &amp;quot;67.87.7.65&amp;quot; ;-) in his impression. He's right about that even of the ESS featured models, some don't have the chip. He's also right about that with the current implementation in ThinkPads you are pretty free to choose using it or not using it. Hence it's a feature. As i see it trouble arises from different sides... the software and the law. These both could eventually force you using it. However, i think there's no need to by a A30 or whatever, just because it doesn't feature that chip. You can buy any other ThinkPad, never enable the chip and be happy. What this article is good for, however, is to make people concious about both, what it really can do, and what privacy and security risks are involved with it.&lt;br /&gt;
&lt;br /&gt;
And BTW, i think that your assumtion of IBM using the ESS name instead of TCG/TCPA to confuse people is a little paranoid. ;-) Look at any IBM page about the ESS and you'll find the words &amp;quot;TCG compliant&amp;quot; within the first sentences, linking to the TCG page. Being suspicious is good, but don't give in to speculations too much.&lt;br /&gt;
&lt;br /&gt;
Wyrfel.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hello Wyrfel,&lt;br /&gt;
&lt;br /&gt;
no, no, don't get me worng please. The new name by IBM is not to confuse people, but to have it copyrighted and stuff like that.&lt;br /&gt;
&lt;br /&gt;
Gues why IBM is calling it UltraBay, Dell is calling it MediaBay and FixBay and the third Company I forgot the name of is calling it SelectBay? &lt;br /&gt;
&lt;br /&gt;
Because they want to keep the rights of their names / marketing phrases and don't want to pay license fees to the competitors. &lt;br /&gt;
&lt;br /&gt;
For example even the Nike Logo (called &amp;quot;swoosh&amp;quot;) is protected due to heavy brand pirating in developing countires and china.&lt;br /&gt;
&lt;br /&gt;
Sniff, I am *not* paranoid.&lt;br /&gt;
&lt;br /&gt;
(-:&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 21:26, 6 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi, ok, ok. That's just what i think, but when you originally posted it it sounded like a reference to the TCPA/TCG releated name changes. I'm glad that you're not paranoid. ;-) Wyrfel.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== No sure where to begin... ==&lt;br /&gt;
&lt;br /&gt;
Hi, I started to edit the Open-Source Software section, but then realized that I'd basically end up deleting it, and didn't want that w/o discussion.&lt;br /&gt;
&lt;br /&gt;
There's no certification process for trusted computing applications at all, anywhere. Right now, you can write an app using trousers, the Trusted Computing Software Stack for Linux, and distribute it as widely as you'd like. Everyone with a TPM would be able to use it on Linux w/o restrictions, just like any other app.&lt;br /&gt;
&lt;br /&gt;
In other sections of the doc, there is discussion on how difficult it is to separate Palladium and TC. This should not be difficult at all...  Palladium is a massive set of technologies built on top of a TSS Stack for windows.  Right now, very few apps have been written for Linux and its TSS.&lt;br /&gt;
&lt;br /&gt;
ALso, how can I get my thinkwiki username to appear after my posts?&lt;br /&gt;
Thanks, shpedoikal&lt;/div&gt;</summary>
		<author><name>Shpedoikal</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Embedded_Security_Subsystem&amp;diff=6749</id>
		<title>Embedded Security Subsystem</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Embedded_Security_Subsystem&amp;diff=6749"/>
		<updated>2005-07-13T21:52:12Z</updated>

		<summary type="html">&lt;p&gt;Shpedoikal: /* Embedded Security Subsystem 2.0 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|style=&amp;quot;vertical-align:top;padding-right:20px;width:10px;&amp;quot; | [[Image:ESS.jpg|IBM Embedded Security Subsystem]] __NOTOC__&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: 0; margin-right:10px; border: 1px solid #dfdfdf; padding: 0em 1em 1em 1em; background-color:#F8F8FF; align:right;&amp;quot;&amp;gt;&lt;br /&gt;
=== The Embedded Security Subsystem ===&lt;br /&gt;
The Embedded Security Subsystem is nothing but a chip installed on the Thinkpads mainboard that can take care of certain security related tasks conforming to the TCPA standard. It was first introduced among the T23 models and is now under the name Embedded Security Subsystem 2.0 an integral part of most of the modern Thinkpads. The functions of the chip are bound to three main groups:&lt;br /&gt;
* public key functions&lt;br /&gt;
* trusted boot functions&lt;br /&gt;
* initialization and management functions&lt;br /&gt;
&lt;br /&gt;
The purpose of the whole thing is to keep the users sensitive data out of range from software based attacks (like viruses, internet attacks etc.). One way the chip offers to achieve this is by providing storage for keys along with the neccessary functions to handle them within itself, so that a i.e. a private key never has to leave the chip (can't be seen by any piece of software). Besides this there are more complex topics covered by the functionality of the chip. If you want to find out more about it you can find good documents on the [http://www.research.ibm.com/gsal/tcpa/ IBM Research TCPA resources page].&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Trusted or Treacherous?==&lt;br /&gt;
&lt;br /&gt;
TC - Trusted Computing - will be the biggest change of the information landscape since decades. Besides positive features like a more secure hardware storage for cryptographic keys, an analysis of the proposed TCG-standards shows some problematic properties. &amp;lt;br /&amp;gt;&lt;br /&gt;
As Thinkpads of recent generations following the Thinkpad T23 ([[Embedded Security Subsystem#Models featuring this Technology|see the complete list of models]]) are equipped with this disputed TCG-/TCPA-Technology, it can be interesting, which promises of the TCG are fulfilled inside your ThinkPad and which parts of the TCG-specifications still seem to be a privacy issue for every user of digital devices like a MP3-player or a ThinkPad - so please read [[TCPA/TCG - Trusted or Treacherous|this article]] for more details.&lt;br /&gt;
&lt;br /&gt;
==Linux Support==&lt;br /&gt;
Two linux drivers are available, a [[tpm|classical one]] and a [[tpmdd|newer one]].&lt;br /&gt;
Coverage of functionality of the first is unknown so far, the second is part of a bigger project aiming to provide a usable security framework.&lt;br /&gt;
&lt;br /&gt;
David Stafford (one of the developers of the tpm code at IBM) on March 10, 2005 sent me the most recent version of the tpm-kml code. With his permission, I quote his email:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;I am attaching our latest driver and library.&lt;br /&gt;
This version is in the process of kernel mailing list review, and&lt;br /&gt;
will hopefully be accepted into the official kernel. It works&lt;br /&gt;
much better across various 2.6 kernels. Note that this builds&lt;br /&gt;
three modules tpm, tpm_atmel, and tpm_nsc. You modprobe the&lt;br /&gt;
tpm_atmel (for all current shipping atmel based systems), or&lt;br /&gt;
tpm_nsc (for the coming national based systems).&lt;br /&gt;
&lt;br /&gt;
Also note that there is a conflict with the snd-intel8x0&lt;br /&gt;
kernel module (they each try to grab the LPC bus). You can&lt;br /&gt;
either: load the tpm modules first (such as in initrd or&lt;br /&gt;
rc.sysinit, before sound), or recompile the snd-intel8x0, turning&lt;br /&gt;
off the MIDI and JOYSTICK support. The latest 2.6.11 version&lt;br /&gt;
of snd-intel8x0 also reportedly fixes things.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Compiling this library was easy. Compiling the driver on my 2.6.8-686 (debian testing) laptop failed. But the library works with the driver I compiled from the tpm-2.0 package IBM made available on its pages (see the links below).&lt;br /&gt;
&lt;br /&gt;
Gijs&lt;br /&gt;
&lt;br /&gt;
The T43 requires a patch posted to the LKML by Kylene Jo Hall: [http://marc.theaimsgroup.com/?l=linux-kernel&amp;amp;m=111884603309146&amp;amp;w=2 LKML posting]. An updated patch for linux 2.6.12 is available [http://shamrock.dyndns.org/~ln/linux/tpm_2.6.12.diff here].&lt;br /&gt;
&lt;br /&gt;
==Versions &amp;amp; Features==&lt;br /&gt;
=== Embedded Security Chip ===&lt;br /&gt;
IBM introduced it's TCPA/TCG features with some of the [[:Category:T23|T23]] models. The earlier of them didn't yet have the Embedded Security Subsystem, but a kind of pre 1.0 version called the Embedded Security Chip. This chip had the following capabilities:&lt;br /&gt;
*Data communications authentication and encryption&lt;br /&gt;
*Storage of encrypted passwords&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security Subsystem (1.0) ===&lt;br /&gt;
The original Embedded Security Subsystem (in IBM documents there is no use of the additive version-number 1.0) claims to be compliant with TCG specs, but apparently did not fully implement any specific TCG spec.&lt;br /&gt;
&lt;br /&gt;
The Embedded Security Subsystem has the following features:&lt;br /&gt;
*hardware key storage&lt;br /&gt;
*multi-factor authentication&lt;br /&gt;
*local file encryption&lt;br /&gt;
*enhances VPN security&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security Subsystem 2.0 ===&lt;br /&gt;
The Embedded Security Subsystem 2.0 conforms to the TCG TPM 1.1b specification, with a TPM manufactured by either Atmel or National Semiconductor.&lt;br /&gt;
&lt;br /&gt;
The Embedded Security Subsystem 2.0 has the following features:&lt;br /&gt;
*hardware key storage&lt;br /&gt;
*multi-factor authentication&lt;br /&gt;
*local file encryption&lt;br /&gt;
*enhances VPN security&lt;br /&gt;
*TCG compliant&lt;br /&gt;
&lt;br /&gt;
==Models featuring this Technology==&lt;br /&gt;
===IBM Embedded Security Chip===&lt;br /&gt;
*ThinkPad {{T23}}&lt;br /&gt;
===IBM Embedded Security Subsystem===&lt;br /&gt;
*ThinkPad {{A30p}}&lt;br /&gt;
*ThinkPad {{R31}}&lt;br /&gt;
*ThinkPad {{T23}}, {{T30}}&lt;br /&gt;
*ThinkPad {{X22}}, {{X23}}, {{X24}}&lt;br /&gt;
===IBM Embedded Security Subsystem 2.0===&lt;br /&gt;
*ThinkPad {{R32}}, {{R40}}, {{R50}}, {{R50p}}, {{R51}}, {{R52}}&lt;br /&gt;
*ThinkPad {{T40}}, {{T40p}}, {{T41}}, {{T41p}}, {{T42}}, {{T42p}}, {{T43}}, {{T43p}}&lt;br /&gt;
*ThinkPad {{X30}}, {{X31}}, {{X32}}, {{X40}}, {{X41}}, {{X41T}}&lt;br /&gt;
[[Category:Glossary]]&lt;br /&gt;
&lt;br /&gt;
==TCPA/TCG clean models==&lt;br /&gt;
*all models produced before 2000&lt;br /&gt;
*all i Series models&lt;br /&gt;
*ThinkPad [[:Category:240X|240X]]&lt;br /&gt;
*ThinkPad [[:Category:A20m|A20m]], [[:Category:A20p|A20p]], [[:Category:A21e|A21e]], [[:Category:A21m|A21m]], [[:Category:A21p|A21p]], [[:Category:A22e|A22e]], [[:Category:A22m|A22m]], [[:Category:A22p|A22p]], [[:Category:A30|A30]]&lt;br /&gt;
*ThinkPad [[:Category:T20|T20]], [[:Category:T21|T21]]&lt;br /&gt;
*ThinkPad [[:Category:X20|X20]], [[:Category:X21|X21]], [[:Category:X22|X22]]&lt;br /&gt;
*ThinkPad [[:Category:TransNote|TransNote]]&lt;br /&gt;
&lt;br /&gt;
==External Sources==&lt;br /&gt;
*[http://www.pc.ibm.com/us/think/thinkvantagetech/security.html IBMs ThinkVantage&amp;lt;sup&amp;gt;TM&amp;lt;/sup&amp;gt; Technologies Embedded Security Subsystem page]&lt;br /&gt;
*[http://www.pc.ibm.com/presentations/us/thinkvantage/56/index.html?shortcut=ess&amp;amp; IBMs ThinkVantage&amp;lt;sup&amp;gt;TM&amp;lt;/sup&amp;gt; Technologies Flash presentation - Embedded Security Subsystem]&lt;br /&gt;
*[http://www.research.ibm.com/gsal/tcpa/ IBM Research TCPA resources page]&lt;br /&gt;
*[http://www.prosec.rub.de/trusted_grub.html Trusted Grub]&lt;/div&gt;</summary>
		<author><name>Shpedoikal</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Embedded_Security_Subsystem&amp;diff=6532</id>
		<title>Embedded Security Subsystem</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Embedded_Security_Subsystem&amp;diff=6532"/>
		<updated>2005-07-13T21:51:52Z</updated>

		<summary type="html">&lt;p&gt;Shpedoikal: /* Embedded Security System 2.0 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|style=&amp;quot;vertical-align:top;padding-right:20px;width:10px;&amp;quot; | [[Image:ESS.jpg|IBM Embedded Security Subsystem]] __NOTOC__&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: 0; margin-right:10px; border: 1px solid #dfdfdf; padding: 0em 1em 1em 1em; background-color:#F8F8FF; align:right;&amp;quot;&amp;gt;&lt;br /&gt;
=== The Embedded Security Subsystem ===&lt;br /&gt;
The Embedded Security Subsystem is nothing but a chip installed on the Thinkpads mainboard that can take care of certain security related tasks conforming to the TCPA standard. It was first introduced among the T23 models and is now under the name Embedded Security Subsystem 2.0 an integral part of most of the modern Thinkpads. The functions of the chip are bound to three main groups:&lt;br /&gt;
* public key functions&lt;br /&gt;
* trusted boot functions&lt;br /&gt;
* initialization and management functions&lt;br /&gt;
&lt;br /&gt;
The purpose of the whole thing is to keep the users sensitive data out of range from software based attacks (like viruses, internet attacks etc.). One way the chip offers to achieve this is by providing storage for keys along with the neccessary functions to handle them within itself, so that a i.e. a private key never has to leave the chip (can't be seen by any piece of software). Besides this there are more complex topics covered by the functionality of the chip. If you want to find out more about it you can find good documents on the [http://www.research.ibm.com/gsal/tcpa/ IBM Research TCPA resources page].&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Trusted or Treacherous?==&lt;br /&gt;
&lt;br /&gt;
TC - Trusted Computing - will be the biggest change of the information landscape since decades. Besides positive features like a more secure hardware storage for cryptographic keys, an analysis of the proposed TCG-standards shows some problematic properties. &amp;lt;br /&amp;gt;&lt;br /&gt;
As Thinkpads of recent generations following the Thinkpad T23 ([[Embedded Security Subsystem#Models featuring this Technology|see the complete list of models]]) are equipped with this disputed TCG-/TCPA-Technology, it can be interesting, which promises of the TCG are fulfilled inside your ThinkPad and which parts of the TCG-specifications still seem to be a privacy issue for every user of digital devices like a MP3-player or a ThinkPad - so please read [[TCPA/TCG - Trusted or Treacherous|this article]] for more details.&lt;br /&gt;
&lt;br /&gt;
==Linux Support==&lt;br /&gt;
Two linux drivers are available, a [[tpm|classical one]] and a [[tpmdd|newer one]].&lt;br /&gt;
Coverage of functionality of the first is unknown so far, the second is part of a bigger project aiming to provide a usable security framework.&lt;br /&gt;
&lt;br /&gt;
David Stafford (one of the developers of the tpm code at IBM) on March 10, 2005 sent me the most recent version of the tpm-kml code. With his permission, I quote his email:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;I am attaching our latest driver and library.&lt;br /&gt;
This version is in the process of kernel mailing list review, and&lt;br /&gt;
will hopefully be accepted into the official kernel. It works&lt;br /&gt;
much better across various 2.6 kernels. Note that this builds&lt;br /&gt;
three modules tpm, tpm_atmel, and tpm_nsc. You modprobe the&lt;br /&gt;
tpm_atmel (for all current shipping atmel based systems), or&lt;br /&gt;
tpm_nsc (for the coming national based systems).&lt;br /&gt;
&lt;br /&gt;
Also note that there is a conflict with the snd-intel8x0&lt;br /&gt;
kernel module (they each try to grab the LPC bus). You can&lt;br /&gt;
either: load the tpm modules first (such as in initrd or&lt;br /&gt;
rc.sysinit, before sound), or recompile the snd-intel8x0, turning&lt;br /&gt;
off the MIDI and JOYSTICK support. The latest 2.6.11 version&lt;br /&gt;
of snd-intel8x0 also reportedly fixes things.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Compiling this library was easy. Compiling the driver on my 2.6.8-686 (debian testing) laptop failed. But the library works with the driver I compiled from the tpm-2.0 package IBM made available on its pages (see the links below).&lt;br /&gt;
&lt;br /&gt;
Gijs&lt;br /&gt;
&lt;br /&gt;
The T43 requires a patch posted to the LKML by Kylene Jo Hall: [http://marc.theaimsgroup.com/?l=linux-kernel&amp;amp;m=111884603309146&amp;amp;w=2 LKML posting]. An updated patch for linux 2.6.12 is available [http://shamrock.dyndns.org/~ln/linux/tpm_2.6.12.diff here].&lt;br /&gt;
&lt;br /&gt;
==Versions &amp;amp; Features==&lt;br /&gt;
=== Embedded Security Chip ===&lt;br /&gt;
IBM introduced it's TCPA/TCG features with some of the [[:Category:T23|T23]] models. The earlier of them didn't yet have the Embedded Security Subsystem, but a kind of pre 1.0 version called the Embedded Security Chip. This chip had the following capabilities:&lt;br /&gt;
*Data communications authentication and encryption&lt;br /&gt;
*Storage of encrypted passwords&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security Subsystem (1.0) ===&lt;br /&gt;
The original Embedded Security Subsystem (in IBM documents there is no use of the additive version-number 1.0) claims to be compliant with TCG specs, but apparently did not fully implement any specific TCG spec.&lt;br /&gt;
&lt;br /&gt;
The Embedded Security Subsystem has the following features:&lt;br /&gt;
*hardware key storage&lt;br /&gt;
*multi-factor authentication&lt;br /&gt;
*local file encryption&lt;br /&gt;
*enhances VPN security&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security Subsystem 2.0 ===&lt;br /&gt;
The Embedded Security Subsystem 2.0 conforms to the TCG TPM 1.1b specification, with either a TPM manufactured by either Atmel or National Semiconductor.&lt;br /&gt;
&lt;br /&gt;
The Embedded Security Subsystem 2.0 has the following features:&lt;br /&gt;
*hardware key storage&lt;br /&gt;
*multi-factor authentication&lt;br /&gt;
*local file encryption&lt;br /&gt;
*enhances VPN security&lt;br /&gt;
*TCG compliant&lt;br /&gt;
&lt;br /&gt;
==Models featuring this Technology==&lt;br /&gt;
===IBM Embedded Security Chip===&lt;br /&gt;
*ThinkPad {{T23}}&lt;br /&gt;
===IBM Embedded Security Subsystem===&lt;br /&gt;
*ThinkPad {{A30p}}&lt;br /&gt;
*ThinkPad {{R31}}&lt;br /&gt;
*ThinkPad {{T23}}, {{T30}}&lt;br /&gt;
*ThinkPad {{X22}}, {{X23}}, {{X24}}&lt;br /&gt;
===IBM Embedded Security Subsystem 2.0===&lt;br /&gt;
*ThinkPad {{R32}}, {{R40}}, {{R50}}, {{R50p}}, {{R51}}, {{R52}}&lt;br /&gt;
*ThinkPad {{T40}}, {{T40p}}, {{T41}}, {{T41p}}, {{T42}}, {{T42p}}, {{T43}}, {{T43p}}&lt;br /&gt;
*ThinkPad {{X30}}, {{X31}}, {{X32}}, {{X40}}, {{X41}}, {{X41T}}&lt;br /&gt;
[[Category:Glossary]]&lt;br /&gt;
&lt;br /&gt;
==TCPA/TCG clean models==&lt;br /&gt;
*all models produced before 2000&lt;br /&gt;
*all i Series models&lt;br /&gt;
*ThinkPad [[:Category:240X|240X]]&lt;br /&gt;
*ThinkPad [[:Category:A20m|A20m]], [[:Category:A20p|A20p]], [[:Category:A21e|A21e]], [[:Category:A21m|A21m]], [[:Category:A21p|A21p]], [[:Category:A22e|A22e]], [[:Category:A22m|A22m]], [[:Category:A22p|A22p]], [[:Category:A30|A30]]&lt;br /&gt;
*ThinkPad [[:Category:T20|T20]], [[:Category:T21|T21]]&lt;br /&gt;
*ThinkPad [[:Category:X20|X20]], [[:Category:X21|X21]], [[:Category:X22|X22]]&lt;br /&gt;
*ThinkPad [[:Category:TransNote|TransNote]]&lt;br /&gt;
&lt;br /&gt;
==External Sources==&lt;br /&gt;
*[http://www.pc.ibm.com/us/think/thinkvantagetech/security.html IBMs ThinkVantage&amp;lt;sup&amp;gt;TM&amp;lt;/sup&amp;gt; Technologies Embedded Security Subsystem page]&lt;br /&gt;
*[http://www.pc.ibm.com/presentations/us/thinkvantage/56/index.html?shortcut=ess&amp;amp; IBMs ThinkVantage&amp;lt;sup&amp;gt;TM&amp;lt;/sup&amp;gt; Technologies Flash presentation - Embedded Security Subsystem]&lt;br /&gt;
*[http://www.research.ibm.com/gsal/tcpa/ IBM Research TCPA resources page]&lt;br /&gt;
*[http://www.prosec.rub.de/trusted_grub.html Trusted Grub]&lt;/div&gt;</summary>
		<author><name>Shpedoikal</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Embedded_Security_Subsystem&amp;diff=6531</id>
		<title>Embedded Security Subsystem</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Embedded_Security_Subsystem&amp;diff=6531"/>
		<updated>2005-07-13T21:50:13Z</updated>

		<summary type="html">&lt;p&gt;Shpedoikal: /* Embedded Security System (1.0) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|style=&amp;quot;vertical-align:top;padding-right:20px;width:10px;&amp;quot; | [[Image:ESS.jpg|IBM Embedded Security Subsystem]] __NOTOC__&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: 0; margin-right:10px; border: 1px solid #dfdfdf; padding: 0em 1em 1em 1em; background-color:#F8F8FF; align:right;&amp;quot;&amp;gt;&lt;br /&gt;
=== The Embedded Security Subsystem ===&lt;br /&gt;
The Embedded Security Subsystem is nothing but a chip installed on the Thinkpads mainboard that can take care of certain security related tasks conforming to the TCPA standard. It was first introduced among the T23 models and is now under the name Embedded Security Subsystem 2.0 an integral part of most of the modern Thinkpads. The functions of the chip are bound to three main groups:&lt;br /&gt;
* public key functions&lt;br /&gt;
* trusted boot functions&lt;br /&gt;
* initialization and management functions&lt;br /&gt;
&lt;br /&gt;
The purpose of the whole thing is to keep the users sensitive data out of range from software based attacks (like viruses, internet attacks etc.). One way the chip offers to achieve this is by providing storage for keys along with the neccessary functions to handle them within itself, so that a i.e. a private key never has to leave the chip (can't be seen by any piece of software). Besides this there are more complex topics covered by the functionality of the chip. If you want to find out more about it you can find good documents on the [http://www.research.ibm.com/gsal/tcpa/ IBM Research TCPA resources page].&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Trusted or Treacherous?==&lt;br /&gt;
&lt;br /&gt;
TC - Trusted Computing - will be the biggest change of the information landscape since decades. Besides positive features like a more secure hardware storage for cryptographic keys, an analysis of the proposed TCG-standards shows some problematic properties. &amp;lt;br /&amp;gt;&lt;br /&gt;
As Thinkpads of recent generations following the Thinkpad T23 ([[Embedded Security Subsystem#Models featuring this Technology|see the complete list of models]]) are equipped with this disputed TCG-/TCPA-Technology, it can be interesting, which promises of the TCG are fulfilled inside your ThinkPad and which parts of the TCG-specifications still seem to be a privacy issue for every user of digital devices like a MP3-player or a ThinkPad - so please read [[TCPA/TCG - Trusted or Treacherous|this article]] for more details.&lt;br /&gt;
&lt;br /&gt;
==Linux Support==&lt;br /&gt;
Two linux drivers are available, a [[tpm|classical one]] and a [[tpmdd|newer one]].&lt;br /&gt;
Coverage of functionality of the first is unknown so far, the second is part of a bigger project aiming to provide a usable security framework.&lt;br /&gt;
&lt;br /&gt;
David Stafford (one of the developers of the tpm code at IBM) on March 10, 2005 sent me the most recent version of the tpm-kml code. With his permission, I quote his email:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;I am attaching our latest driver and library.&lt;br /&gt;
This version is in the process of kernel mailing list review, and&lt;br /&gt;
will hopefully be accepted into the official kernel. It works&lt;br /&gt;
much better across various 2.6 kernels. Note that this builds&lt;br /&gt;
three modules tpm, tpm_atmel, and tpm_nsc. You modprobe the&lt;br /&gt;
tpm_atmel (for all current shipping atmel based systems), or&lt;br /&gt;
tpm_nsc (for the coming national based systems).&lt;br /&gt;
&lt;br /&gt;
Also note that there is a conflict with the snd-intel8x0&lt;br /&gt;
kernel module (they each try to grab the LPC bus). You can&lt;br /&gt;
either: load the tpm modules first (such as in initrd or&lt;br /&gt;
rc.sysinit, before sound), or recompile the snd-intel8x0, turning&lt;br /&gt;
off the MIDI and JOYSTICK support. The latest 2.6.11 version&lt;br /&gt;
of snd-intel8x0 also reportedly fixes things.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Compiling this library was easy. Compiling the driver on my 2.6.8-686 (debian testing) laptop failed. But the library works with the driver I compiled from the tpm-2.0 package IBM made available on its pages (see the links below).&lt;br /&gt;
&lt;br /&gt;
Gijs&lt;br /&gt;
&lt;br /&gt;
The T43 requires a patch posted to the LKML by Kylene Jo Hall: [http://marc.theaimsgroup.com/?l=linux-kernel&amp;amp;m=111884603309146&amp;amp;w=2 LKML posting]. An updated patch for linux 2.6.12 is available [http://shamrock.dyndns.org/~ln/linux/tpm_2.6.12.diff here].&lt;br /&gt;
&lt;br /&gt;
==Versions &amp;amp; Features==&lt;br /&gt;
=== Embedded Security Chip ===&lt;br /&gt;
IBM introduced it's TCPA/TCG features with some of the [[:Category:T23|T23]] models. The earlier of them didn't yet have the Embedded Security Subsystem, but a kind of pre 1.0 version called the Embedded Security Chip. This chip had the following capabilities:&lt;br /&gt;
*Data communications authentication and encryption&lt;br /&gt;
*Storage of encrypted passwords&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security Subsystem (1.0) ===&lt;br /&gt;
The original Embedded Security Subsystem (in IBM documents there is no use of the additive version-number 1.0) claims to be compliant with TCG specs, but apparently did not fully implement any specific TCG spec.&lt;br /&gt;
&lt;br /&gt;
The Embedded Security Subsystem has the following features:&lt;br /&gt;
*hardware key storage&lt;br /&gt;
*multi-factor authentication&lt;br /&gt;
*local file encryption&lt;br /&gt;
*enhances VPN security&lt;br /&gt;
&lt;br /&gt;
=== Embedded Security System 2.0 ===&lt;br /&gt;
The recent TCG-specification is &amp;quot;TCG 1.2&amp;quot; and Embedded Security System 2.0 is supposed to use this newer specification.&lt;br /&gt;
&lt;br /&gt;
The Embedded Security Subsystem 2.0 has the following features:&lt;br /&gt;
*hardware key storage&lt;br /&gt;
*multi-factor authentication&lt;br /&gt;
*local file encryption&lt;br /&gt;
*enhances VPN security&lt;br /&gt;
*TCG compliant&lt;br /&gt;
&lt;br /&gt;
==Models featuring this Technology==&lt;br /&gt;
===IBM Embedded Security Chip===&lt;br /&gt;
*ThinkPad {{T23}}&lt;br /&gt;
===IBM Embedded Security Subsystem===&lt;br /&gt;
*ThinkPad {{A30p}}&lt;br /&gt;
*ThinkPad {{R31}}&lt;br /&gt;
*ThinkPad {{T23}}, {{T30}}&lt;br /&gt;
*ThinkPad {{X22}}, {{X23}}, {{X24}}&lt;br /&gt;
===IBM Embedded Security Subsystem 2.0===&lt;br /&gt;
*ThinkPad {{R32}}, {{R40}}, {{R50}}, {{R50p}}, {{R51}}, {{R52}}&lt;br /&gt;
*ThinkPad {{T40}}, {{T40p}}, {{T41}}, {{T41p}}, {{T42}}, {{T42p}}, {{T43}}, {{T43p}}&lt;br /&gt;
*ThinkPad {{X30}}, {{X31}}, {{X32}}, {{X40}}, {{X41}}, {{X41T}}&lt;br /&gt;
[[Category:Glossary]]&lt;br /&gt;
&lt;br /&gt;
==TCPA/TCG clean models==&lt;br /&gt;
*all models produced before 2000&lt;br /&gt;
*all i Series models&lt;br /&gt;
*ThinkPad [[:Category:240X|240X]]&lt;br /&gt;
*ThinkPad [[:Category:A20m|A20m]], [[:Category:A20p|A20p]], [[:Category:A21e|A21e]], [[:Category:A21m|A21m]], [[:Category:A21p|A21p]], [[:Category:A22e|A22e]], [[:Category:A22m|A22m]], [[:Category:A22p|A22p]], [[:Category:A30|A30]]&lt;br /&gt;
*ThinkPad [[:Category:T20|T20]], [[:Category:T21|T21]]&lt;br /&gt;
*ThinkPad [[:Category:X20|X20]], [[:Category:X21|X21]], [[:Category:X22|X22]]&lt;br /&gt;
*ThinkPad [[:Category:TransNote|TransNote]]&lt;br /&gt;
&lt;br /&gt;
==External Sources==&lt;br /&gt;
*[http://www.pc.ibm.com/us/think/thinkvantagetech/security.html IBMs ThinkVantage&amp;lt;sup&amp;gt;TM&amp;lt;/sup&amp;gt; Technologies Embedded Security Subsystem page]&lt;br /&gt;
*[http://www.pc.ibm.com/presentations/us/thinkvantage/56/index.html?shortcut=ess&amp;amp; IBMs ThinkVantage&amp;lt;sup&amp;gt;TM&amp;lt;/sup&amp;gt; Technologies Flash presentation - Embedded Security Subsystem]&lt;br /&gt;
*[http://www.research.ibm.com/gsal/tcpa/ IBM Research TCPA resources page]&lt;br /&gt;
*[http://www.prosec.rub.de/trusted_grub.html Trusted Grub]&lt;/div&gt;</summary>
		<author><name>Shpedoikal</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:Embedded_Security_Subsystem&amp;diff=16683</id>
		<title>Talk:Embedded Security Subsystem</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:Embedded_Security_Subsystem&amp;diff=16683"/>
		<updated>2005-07-13T21:48:19Z</updated>

		<summary type="html">&lt;p&gt;Shpedoikal: /* ESS page may have errors... */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Q: Good or Bad?&lt;br /&gt;
&lt;br /&gt;
Someone said: This Security Chip is a hardware trojan. True or false?&lt;br /&gt;
&lt;br /&gt;
== hmmm. depends. but the fear is big, that it is trojan... ==&lt;br /&gt;
&lt;br /&gt;
Hello,&lt;br /&gt;
&lt;br /&gt;
I would say it depends, how TCPA/'Fritz'-Chip is used. But the fear of the critics and (cyber) civil rights people are, that the industry wants to control the use of digital media like MP3, DVD, etc. to prevent copying - even if you own it.&lt;br /&gt;
&lt;br /&gt;
There is also a fear, that there are hidden channels in this black box type of hardware, because hidden channels where found in so many black box type of hardware for years now. What is transmitted over these hidden channels?&lt;br /&gt;
&lt;br /&gt;
The recent modifications by the TCG because of the critic and the resulting pressure are a good beginning. We, the consumers and users, have to go an with our demands, with our critic and we have to look carefully, what TCG and the others are doing here.&lt;br /&gt;
&lt;br /&gt;
Why? Because it will affect all of us sooner or later in using our MP3- or DVD-Players or e.g. -Software on our computers etc. And you can think also about your mobile cellular phones, digital cameras and so on. Digital content, digital media is more and more widespread.&lt;br /&gt;
&lt;br /&gt;
And this is where Digital Rights Management (DRM) comes into the game. DRM is feared to be a trade barrier for a free market, a barrier to future historians, etc.&lt;br /&gt;
&lt;br /&gt;
Trusted Computing is not bad by meaning, but it is bad (or 'lousy'?), how the industry is implementing it. They could do better, right?&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 12:19, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== ESS page may have errors... ==&lt;br /&gt;
&lt;br /&gt;
Hi,  The ESS 1.0 section claims that its based on TCG 1.1 specs, but I cannot find anything to support that.  The ESS 2.0 systems I have all have v1.1 TPMs in them, but I don't have an ESS 1.0 system. As far as I know, the ESS 1.0 does not implement any TCG specification.&lt;br /&gt;
&lt;br /&gt;
Also, the ESS 2.0 does not provide a TCG 1.2 TPM.  No currently shipping IBM platforms contain 1.2 TPMs. I thought I'd mention this stuff somewhere before just changing the wiki with no discussion.&lt;br /&gt;
&lt;br /&gt;
Thanks&lt;br /&gt;
----&lt;br /&gt;
Thanks. You could have just changed it and leave a note with pointers to your sources. I also wondered about the fact that IBM says nothing about TCG in ESS 1.0, but i didn't find any more detailed information. Did you? And if so, where?&lt;br /&gt;
&lt;br /&gt;
[[User:Wyrfel|Wyrfel]] 19:59, 12 Jul 2005 (CEST)&lt;br /&gt;
----&lt;br /&gt;
Yeah, I am seeing less and less on ESS 1.0 on www.ibm.com, which is my source for this stuff. If I come across anything concrete, I'll post it.&lt;/div&gt;</summary>
		<author><name>Shpedoikal</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6593</id>
		<title>TCPA/TCG - Trusted or Treacherous</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=TCPA/TCG_-_Trusted_or_Treacherous&amp;diff=6593"/>
		<updated>2005-07-12T17:59:13Z</updated>

		<summary type="html">&lt;p&gt;Shpedoikal: /* Related Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|style=&amp;quot;vertical-align:top;padding-right:20px;white-space:nowrap;&amp;quot; | __TOC__&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: 0; margin-right:10px; border: 1px solid #dfdfdf; padding: 0em 1em 1em 1em; background-color:#F8F8FF; align:right;&amp;quot;&amp;gt;The Members of the Trusted Computing Group (TCG), formerly the Trusted Computing Platform Allience (TCPA), are working on a paradigm shift in information technology, which could become the biggest change of the information landscape since decades.&lt;br /&gt;
&lt;br /&gt;
This article tries to gather information about the implications of the TCPA and TCG effords. To many users these implications seem rather treacherous than trustworthy. This article tries to give a short summarized overview over the facts from a rather netral point of view.&lt;br /&gt;
&lt;br /&gt;
We will start with a quote:&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;It is clear that trusted computing hardware provides security benefits, if software is prepared to take advantage of it. But trusted computing has been received skeptically and remains controversial. Some of the controversy is based on misconceptions, but much of it is appropriate, since trusted computing systems fundamentally alter trust relationships. Legitimate concerns about trusted computing are not limited to one area, such as consumer privacy or copyright issues.'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''We have at least two serious concerns about trusted computing. First, existing designs are fundamentally flawed because they expose the public to new risks of anti-competitive and anti-consumer behavior. Second, manufacturers of particular &amp;quot;trusted&amp;quot; computers and components may secretly implement them incorrectly.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
''Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation]''&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==TC - Trusted Computing==&lt;br /&gt;
Recently, the number of known security incidents has been dramatically increasing. Thus, security issues in computer industry have been pushed forward. So far, digital content on computers couldn't be efficiently protected since every security mechanism accessible by software could always be circumvent by software.&lt;br /&gt;
&lt;br /&gt;
The idea of Trusted Computing is to provide a hardware layer that cares for&lt;br /&gt;
* storage of security related data like keys, certificates and checksums&lt;br /&gt;
* encryption and decryption&lt;br /&gt;
* validation of certificates&lt;br /&gt;
* (Remote) Platform Attestation (''meaning that somebody can check the state of your personal computer over the internet'')&lt;br /&gt;
* Sealing (''meaning binding data to a specific platform and application'')&lt;br /&gt;
&lt;br /&gt;
Since this way the hardware can handle security management without any software being able to access the security data (like a Black Box). Moreover, the whole software layer can be 'monitored' by the hardware through the use of checksums. Hence the TCPA layer can recognise changes to the software layer and block the whole system from starting, this way keeping malicious software from running at all.&lt;br /&gt;
&lt;br /&gt;
==A short history of TCPA, TCG, Palladium and NSCB:==&lt;br /&gt;
* 1999: The Trusted Computing Platform Alliance (TCPA) is founded by Intel, Microsoft, HP, Compaq and IBM. &lt;br /&gt;
* February 2002: The TCPA Main Specification Version 1.1b is being published. &lt;br /&gt;
* Early 2003: The name of Microsofts own TC-Projekt &amp;quot;Palladium&amp;quot; is changed to &amp;quot;next-generation secure computing base&amp;quot; (NGSCB).&lt;br /&gt;
* April 2003: The Trusted Computing Group (TCG) is founded by AMD, HP, IBM, Intel and Microsoft.&lt;br /&gt;
* Summer 2004: Microsoft seems to have stopped their &amp;quot;NGSCB&amp;quot;-effort.&lt;br /&gt;
&lt;br /&gt;
==The TCPA==&lt;br /&gt;
Founded 1999 by Compaq, HP, IBM, Intel and Microsoft, the TCPA counts around 200 members by now, among them Adobe, AMD, Fujitsu-Siemens, Gateway, Motorola, Samsung, Toshiba and many others.&lt;br /&gt;
&lt;br /&gt;
==The TCG==&lt;br /&gt;
As successor of the TCPA, the TCG was founded by AMD, HP, IBM, Intel and Microsoft in April 2004.&lt;br /&gt;
&lt;br /&gt;
==TCG Hardware Architecture==&lt;br /&gt;
The Trusted Platform Module (TPM) (a.k.a. &amp;quot;Fritz&amp;quot;-Chip) is the central element of the TCG architecture. Imagine a hardwired smart card for a abstract picture of this architecture.&lt;br /&gt;
&lt;br /&gt;
The integration of the whole functionality into the CPU is also discussed, which would increase resistance against tampering attacks (see also Intel &amp;quot;LaGrande&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Regarding the hardware security of the &amp;quot;Trusted Platform Modules (TPM)&amp;quot;, there were two important critiques:&lt;br /&gt;
*The first one has been the insuficient security certification against hardware attacks. In TCG 1.2 this critique has been addressed by an improvement of the hardware requirements. It has to be seen how strong the resistance against sophisticated attacks at intensively daily usage will be.&lt;br /&gt;
*The second one addreses the 'black box'-characterisitcs and risk 'hidden channels' in the TCG-Hardware, which can be easily implemented and used to send secret information to third parties.&lt;br /&gt;
&lt;br /&gt;
==TC - Treacherous Computing?==&lt;br /&gt;
Generally, there are good arguments that these features can be used to improve the security of computer systems. Trusted Computing offers a lot of features which can be used to protect the personal computer against malicious software and users.  &lt;br /&gt;
&lt;br /&gt;
But according to a lot of technical analysis, most researchers have fundamental critics on the main design considerations. The new infrastructure will offer '''only minor protection against worms and viruses''', although TCG is telling something completely different. Furthermore, some of these features can already be established by todays smart card supported systems, so where is the need for TCG 1.1?&lt;br /&gt;
&lt;br /&gt;
''We recognize that hardware enhancements might be one way to improve computer security. But treating computer owners as adversaries is not progress in computer security. '''The interoperability, competition, owner control, and similar problems inherent in the TCG and NCSCB approach are serious enough that we recommend against adoption of these trusted computing technologies until these problems have been addressed. Fortunately, we believe these problems are not insurmountable''', and we look forward to working with the industry to resolve them.&amp;quot;'' &amp;lt;br /&amp;gt;&lt;br /&gt;
Source: [http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php Electronic Frontier Foundation], bold emphasis by [[User:Pitsche|Pitsche]]&lt;br /&gt;
&lt;br /&gt;
There are a lot of drawbacks to this kind of security implementation: &lt;br /&gt;
*The concept prevents even the device owner from certain operations. &lt;br /&gt;
*Remote Attestation is a good feature to remotely detect tampering of the computer, as long as this 'somebody' is the owner of the platform. But if this Remote Attestation is used by third parties, serious privacy and market domination issues arise.&lt;br /&gt;
*There are certainly legitimate reasons for Sealing. But the main use case seems to be consumer-unfriendly new 'business cases' for content dealers which involve locking down content to a single platform, based on connecting content to a specific device without any migration options. &lt;br /&gt;
&lt;br /&gt;
Additionally, the market domination of Microsoft, obscurities regarding the needed trust infrastructure and a heap of patents have lead to critical evaluations from cryptographers, privacy organizations and European institutions. &amp;lt;br /&amp;gt;&lt;br /&gt;
Because of this pressure the Trusted Computing Group has modifed its proposal. The recent specification is &amp;quot;TCG 1.2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== DRM - Digital Rights Management ===&lt;br /&gt;
The philosophy behind Remote Platform Attestation and Sealing seems to be a protection of the computer system like a ThinkPad or electronic device like a MP3-Player ''against'' its user and owner.&lt;br /&gt;
&lt;br /&gt;
What will do this to the use of digital media content on computers or other electronic devices? The answer of the IT- and the Entertainment-Industry is &amp;quot;Digital Rights Management&amp;quot; or just shortly &amp;quot;DRM&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
''The DRM component takes control over the rest of the user's device which they rightfully own (e.g. MP3-Player'' '''or a ThinkPad)''' ''and restricts how it may act, regardless of the user's wishes (e.g. preventing the user from copying a song). All forms of DRM depend on the device imposing restrictions that cannot be legally disabled or modified by the user. In other words, the user has no choice.'' Bold emphasised by [[User:Pitsche]].&lt;br /&gt;
&lt;br /&gt;
So a new 'name' for DRM came up: '''Digital Restrictions Management''' instead of Digital Rights Management.&lt;br /&gt;
&lt;br /&gt;
Read more at [[Wikipedia:Digital rights management]].&lt;br /&gt;
&lt;br /&gt;
=== Censorship and Avoiding Whistle Blowers ===&lt;br /&gt;
The Siamese twin of Digital Restriction Management is censorship. '''The same techniques which avoid copying music songs can be used to limit the access to all kinds of documents'''. The combination of DRM and observation hardware like TCG leads to very dangerous implications.&lt;br /&gt;
&lt;br /&gt;
Giving a real world example, the Chinese government could easily block the use of all documents containing the words &amp;quot;Dalai Lama&amp;quot; on 'trusted' computer systems.&lt;br /&gt;
&lt;br /&gt;
Another application is the fight against whistle blowers. E.g. government documents about the deportation of own citizens to countries with a doubtful law system or about supporting illegal wars could be made readable for government computers only and combined with a expiration date. This might make it very dificult for the society or following generations to disclose these breaches of humanity.&lt;br /&gt;
&lt;br /&gt;
=== Summary === &lt;br /&gt;
There are still a lot of critical questions, even though TCG 1.2 contains many steps into the right direction.&lt;br /&gt;
&lt;br /&gt;
== Thinkpads with and without TCPA/TCG ==&lt;br /&gt;
&lt;br /&gt;
If you want to know, which ThinkPads are equipped with TCPA Technology like IBM Embedded Security Subsystem or IBM Embedded Security Subsystem 2.0 and which of them are TCPA/TCG clean models, please [[Embedded Security Subsystem#Models featuring this Technology|see the complete list of models]] at the article about [[Embedded Security Subsystem]].&lt;br /&gt;
&lt;br /&gt;
== OpenSource Software and TCG == &lt;br /&gt;
TCG has huge implication for the development of free software. Following a possibly expensive evaluation there will be a signature for one program version. Even if the program is licensed under the GPL every change to the code will make the signature invalid. This seems to be a strong violation of the main philosophy of OpenSource software.&lt;br /&gt;
&lt;br /&gt;
Since Microsoft controls an overwhelming part of the OS market, it seems to be rather difficult to evaluate the TCG proposal separated from the Palladium project.&lt;br /&gt;
&lt;br /&gt;
TCG versus GPL: At least two companies are researching on &amp;quot;TCG-enhanced&amp;quot; versions of GNU/Linux. According most security researchers it seems to be necessary to evaluate programs which have access to the 'trusted part'. &lt;br /&gt;
&lt;br /&gt;
== Related Links ==&lt;br /&gt;
*[http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html 'Trusted Computing' Frequently Asked Questions] - Anti-TC FAQ by Cambridge University security director and professor [[Ross Anderson]].&lt;br /&gt;
*[http://www.againsttcpa.com/ Against-TCPA]&lt;br /&gt;
*[http://invisiblog.com/1c801df4aee49232/article/0df117d5d9b32aea8bc23194ecc270ec Interesting Uses of Trusted Computing]&lt;br /&gt;
*[http://www.gnu.org/philosophy/can-you-trust.html Can you trust your computer?] essay by the FSF&lt;br /&gt;
*[http://www.protectprivacy.org/topic--lang-en.html The civil rights organisation Protect Privacy]&lt;br /&gt;
*[http://trousers.sourceforge.net/faq.html The TrouSerS FAQ.]&lt;br /&gt;
&lt;br /&gt;
== Read more at Wikipedia, the free encyclopedia: ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_computing Trusted Computing]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Trusted_Computing_Platform_Alliance Trusted Computing Group (formerly known as TCPA)]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Fritz-chip Fritz-Chip]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Palladium_operating_system Palladium]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Cryptography Wikipedia-Category: Cryptography]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Copyright_law Wikipedia-Category: Copyright Law]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Category:Digital_rights_management Wikipedia-Category: Digital Rights Management]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Notes from the original artical that didn't fit so far&lt;br /&gt;
&lt;br /&gt;
Compared to this, positive features like a more secure hardware storage for cryptographic keys seem to be a very small benefit.&lt;br /&gt;
&lt;br /&gt;
:Compared with the TCPA the TCG is less democratic organized and the high membership fees obstruct the possibilities for small companies and non profit organizations to participate.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Microsofts own concept for 'Trustworthy Computing', &amp;quot;Palladium&amp;quot;, is expected to cost some hundreds of million cash.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What is all the name changing about? &amp;lt;br /&amp;gt;&lt;br /&gt;
Some say, that the change was a reaction to the negative publicity, because Palladium and TCPA was soon equated with a 'Nineteen Eighty-Four'-Scenario of an 'Orwellian society', the ever-present, all-seeing 'Big Brother' and other privacy issues.&lt;br /&gt;
&lt;br /&gt;
'''This means e.g. if the user wants to use his music to a portable player he should be forced to buy another license. It seems to be doubtful, if customers will enjoy this limitations.'''&lt;br /&gt;
&lt;br /&gt;
In any case the possible problems of giving away control of the personal hardware should be evaluated carefully.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Category:Glossary]]&lt;/div&gt;</summary>
		<author><name>Shpedoikal</name></author>
		
	</entry>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Talk:Embedded_Security_Subsystem&amp;diff=6467</id>
		<title>Talk:Embedded Security Subsystem</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Talk:Embedded_Security_Subsystem&amp;diff=6467"/>
		<updated>2005-07-12T17:55:02Z</updated>

		<summary type="html">&lt;p&gt;Shpedoikal: ESS page may have errors...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Q: Good or Bad?&lt;br /&gt;
&lt;br /&gt;
Someone said: This Security Chip is a hardware trojan. True or false?&lt;br /&gt;
&lt;br /&gt;
== hmmm. depends. but the fear is big, that it is trojan... ==&lt;br /&gt;
&lt;br /&gt;
Hello,&lt;br /&gt;
&lt;br /&gt;
I would say it depends, how TCPA/'Fritz'-Chip is used. But the fear of the critics and (cyber) civil rights people are, that the industry wants to control the use of digital media like MP3, DVD, etc. to prevent copying - even if you own it.&lt;br /&gt;
&lt;br /&gt;
There is also a fear, that there are hidden channels in this black box type of hardware, because hidden channels where found in so many black box type of hardware for years now. What is transmitted over these hidden channels?&lt;br /&gt;
&lt;br /&gt;
The recent modifications by the TCG because of the critic and the resulting pressure are a good beginning. We, the consumers and users, have to go an with our demands, with our critic and we have to look carefully, what TCG and the others are doing here.&lt;br /&gt;
&lt;br /&gt;
Why? Because it will affect all of us sooner or later in using our MP3- or DVD-Players or e.g. -Software on our computers etc. And you can think also about your mobile cellular phones, digital cameras and so on. Digital content, digital media is more and more widespread.&lt;br /&gt;
&lt;br /&gt;
And this is where Digital Rights Management (DRM) comes into the game. DRM is feared to be a trade barrier for a free market, a barrier to future historians, etc.&lt;br /&gt;
&lt;br /&gt;
Trusted Computing is not bad by meaning, but it is bad (or 'lousy'?), how the industry is implementing it. They could do better, right?&lt;br /&gt;
&lt;br /&gt;
--[[User:Pitsche|Pitsche]] 12:19, 4 Jul 2005 (CEST)&lt;br /&gt;
&lt;br /&gt;
== ESS page may have errors... ==&lt;br /&gt;
&lt;br /&gt;
Hi,  The ESS 1.0 section claims that its based on TCG 1.1 specs, but I cannot find anything to support that.  The ESS 2.0 systems I have all have v1.1 TPMs in them, but I don't have an ESS 1.0 system. As far as I know, the ESS 1.0 does not implement any TCG specification.&lt;br /&gt;
&lt;br /&gt;
Also, the ESS 2.0 does not provide a TCG 1.2 TPM.  No currently shipping IBM platforms contain 1.2 TPMs. I thought I'd mention this stuff somewhere before just changing the wiki with no discussion.&lt;br /&gt;
&lt;br /&gt;
Thanks&lt;/div&gt;</summary>
		<author><name>Shpedoikal</name></author>
		
	</entry>
</feed>