I don't know what you mean by full-blown TPMs. I assume that for you, full-blown TPMs = Big Brother. I don't buy into this completely, however.
TPM-enabled systems are still under implementation and the specifics of how they are going to function depend on how they will be implemented. However, if such an implementation is built with user privacy and user control over the TPM in mind, it can be a very powerful solution to existing hard-to-defend-from attacks. There is existing research going on in this area and the results we have look promising. I personally see TPM-enabled systems as special purpose solutions. I believe that this is the only way that we can keep user control over what the TPM does. I don't think TPM-enabled systems (maybe what you call full-blown TPMs) will be widely deployed on PCs. There are indeed multiple issues with it, among which the possibility of Big Brother. However, the technology offers multiple opportunities for applications, where it can be implemented in a controlled manner. Regards, Peter Djalaliev _______________________________________________ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto