I don't know what you mean by full-blown TPMs.  I assume that for you,
full-blown TPMs = Big Brother.  I don't buy into this completely,
however.

TPM-enabled systems are still under implementation and the specifics
of how they are going to function depend on how they will be
implemented.  However, if such an implementation is built with user
privacy and user control over the TPM in mind, it can be a very
powerful solution to existing hard-to-defend-from attacks.  There is
existing research going on in this area and the results we have look
promising.

I personally see TPM-enabled systems as special purpose solutions.  I
believe that this is the only way that we can keep user control over
what the TPM does.  I don't think TPM-enabled systems (maybe what you
call full-blown TPMs) will be widely deployed on PCs.  There are
indeed multiple issues with it, among which the possibility of Big
Brother.  However, the technology offers multiple opportunities for
applications, where it can be implemented in a controlled manner.

Regards,
Peter Djalaliev


_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to