Create an Account
username: password:
 
  MemeStreams Logo

EFF: Trusted Computing: Promise and Risk

search

bucy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

bucy's topics
Arts
  Literature
  Movies
  Music
  TV
   Cartoons
Business
Games
  Video Games
   Console Video Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
  Environment
  Space
Society
  Politics and Law
Sports
Technology
  Computers
   Computer Security
    Cryptography
   Computer Networking
   Computing Platforms

support us

Get MemeStreams Stuff!


 
EFF: Trusted Computing: Promise and Risk
Topic: Politics and Law 1:10 pm EDT, Oct  3, 2003

] Remote attestation works by generating, in hardware, a
] cryptographic certificate attesting to the identity of
] the software currently running on a PC. (There is no
] determination of whether the software is good or bad,
] or whether it is compromised or not compromised.
] "Identity" is represented by a cryptographic hash,
] which simply allows different programs to be
] distinguished from one another, or changes in their
] code to be discerned, without conveying any sort of value
] judgment.) This certificate may, at the PC user's
] request, be provided to any remote party, and in
] principle has the effect of proving to that party that
] the machine is using expected and unaltered software. If
] the software on the machine has been altered, the
] certificate generated will reflect this. We will see
] that this approach, although elegant, proves
] problematic.

READ THIS!

EFF: Trusted Computing: Promise and Risk



 
 
Powered By Industrial Memetics
RSS2.0