|   | 
 
 
 
EFF: Trusted Computing: Promise and Risk  by Decius at  8:45 pm EDT, Oct  2, 2003 |  
] Remote attestation works by generating, in hardware, a ] cryptographic certificate attesting to the identity of ] the software currently running on a PC. (There is no ] determination of whether the software is good or bad, ] or whether it is compromised or not compromised. ] "Identity"	 is represented by a cryptographic hash, ] which simply allows different   programs to be ] distinguished from one another, or changes in their	   ] code to be discerned, without conveying any sort of value ] judgment.) This certificate may, at the PC user's ] request, be provided to any remote party, and in ] principle has the effect of proving to that party  that ] the machine is using expected and unaltered software. If ] the software on the machine has been altered, the ] certificate generated will reflect this. We will see ] that this approach, although elegant, proves ] problematic. Software is law.  |  
  
 
EFF: Trusted Computing: Promise and Risk  by bucy at  1:10 pm EDT, Oct  3, 2003 |  
] Remote attestation works by generating, in hardware, a ] cryptographic certificate attesting to the identity of ] the software currently running on a PC. (There is no ] determination of whether the software is good or bad, ] or whether it is compromised or not compromised. ] "Identity"	 is represented by a cryptographic hash, ] which simply allows different   programs to be ] distinguished from one another, or changes in their	   ] code to be discerned, without conveying any sort of value ] judgment.) This certificate may, at the PC user's ] request, be provided to any remote party, and in ] principle has the effect of proving to that party  that ] the machine is using expected and unaltered software. If ] the software on the machine has been altered, the ] certificate generated will reflect this. We will see ] that this approach, although elegant, proves ] problematic. READ THIS!  |  
  
 
There is a redundant post from k not displayed in this view.
 | 
  |