SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : WAVX: Wave Systems Corp.

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
From: TREND14/2/2007 11:56:17 AM
   of 604
 
Good email from SKS
........................
Posted by: khillo
In reply to: micro59 who wrote msg# 140724 Date:4/2/2007 11:41:58 AM
Post #of 140733

micro59-I send SKS This article, and asked couple questions

his response

TPM is a very important tool to address and solve these issues. It however is not a silver bullet.

Strong machine authentication and user authentication are critical to reducing rootkits and the benefit of attack. It is cute if you steal control of the machine but if you cant steel the authentication credentials it is harder to compromise an identity.

Any software that measures anything on the PC will benefit from the TPM/s ability to provide local measurement reporting. It will however depend strongly on implementation

Data that is encrypted is hard to steal and if the keys are on a TPM then they are very hard to steal. If a root kit copies all my data the encrypted data will still be encrypted.

So I think I agree with both sides of the conversation and both of them will agree TPM is useful but it depends on implementation and policies to get it right.

steven
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext