TPM Security Chip For Your Cell Phone 162
pete314 writes "The Trusted Computing Group has unveiled that it is working on a mobile version of its TPM security chip. It should prevent the phone world from being hit by the same virus and hacking issues that face computers. However, the EFF is not amused, stating that the chip will be used for DRM, and could even limit which software the owner installs on his cell phone."
I don't want a phone with apps (Score:3, Insightful)
etc.
Reminds me of that episode of the Simpsons:
Abortions for all.
*crowd boos*
Very well, no abortions for anyone.
*crowd boos*
Hmm... Abortions for some, miniature American flags for
others.
*crowd cheers*
In my opinion, a phone is a tool. I don't ask screwdriver makers to make blank drivers so I can whittle my own philips head. If I need a tool with more features I will buy it, I don't want to worry about installing or developing my own tools. Meet me. Joe Consumer.
Re:I don't want a phone with apps (Score:5, Insightful)
By posting on slashdot you prove that you actually know about TPM and have formed an opinion on it (at least in regards to mobile phones). Joe Consumer most definitely doesn't know about TPM and hasn't formed an opinion on it. Ergo, you're not Joe Consumer.
Re:I don't want a phone with apps (Score:2)
Perhaps he was trying, vainly in your case, to make a point.
Re:I don't want a phone with apps (Score:2)
Re:I don't want a phone with apps (Score:2)
Oh, and you're the reason my name has an _a affixed to it!
Re:I don't want a phone with apps (Score:1, Funny)
Re:I don't want a phone with apps (Score:5, Insightful)
Re:I don't want a phone with apps (Score:3, Insightful)
Fair enough, there is always going to be a portion of the population who want the no frills version of any given tool. However, in the case of mobile technology think about the fundamental difference between Apple and Microsoft in the early days.
Re:I don't want a phone with apps (Score:3, Insightful)
I *DO* want a computer with apps (Score:3, Insightful)
Re:I *DO* want a computer with apps (Score:2)
Re:I *DO* want a computer with apps (Score:2)
Even if it might not rain, bring an umbrella (Score:2)
Is it safe to speculate yet who will benefit from future "crowd control pain rays?" Would a lot of deep hypothetical speculation be necessary to figure out who "crowd control machine-gun robots" will ultimately be aimed at?
What possible benefit to you will outweigh a possible one-way loss of basic freedoms? Wouldn't it be better to insist on a
Re:Even if it might not rain, bring an umbrella (Score:2)
Re:Even if it might not rain, bring an umbrella (Score:2)
Warning! *flashing lights* Already four words come out and the reply is trying to shove the word "ban" into my mouth, where I said "oppose." Oppose is something people do voluntarily, while "ban" is a negative act of force against voluntary choice. Big difference. Big whitewash.
As it turns out, taking away consumer choice is more along the lines of what the TCG consortium is guilty of supporting. Not little ol' me, I'm not forcing people to do an
they had one before (Score:3, Informative)
There about a gaziallion guides on how to flash your firmwware and get rid of it.
if this chip comes out you can be sure of the fact that people are going to break open their phone and pull that sucker out.
Re:they had one before (Score:2)
If you think this is possible, I suggest you read the TPM spec. Start with Part 1.
It quickly becomes apparent that devices built to be used with this chip will not perform without it. Sure, someone hacked Mac OS X for Intel to run on some other white box machine without a TPM, but that was the OS - you're suggesting that someone just remove the offending hardware and be done with
yes but.. (Score:2)
One problem: that is ILLEGAL (Score:2)
How many people do you really think will risk that?
Re:they had one before (Score:2)
if it were only as easy as pulling the chip out, we'd have no reason to be concerned about our future dystopian overlords.
Logical next step (Score:5, Insightful)
So, why would it be surprising that the carriers would want yet another layer of hardware/software protection to ensure that this golden revenue stream is the only way for people to add games/ringtones/wallpaper etc?
Re:Logical next step (Score:2, Insightful)
As to the question of owners
Newsflash (Score:5, Informative)
Newsflash: Phones already have DRM, it's a lot harder for the average person to bypass than a computer, and phones already limit what applications can be installed, or what they can do.
Re:Newsflash (Score:1)
Re:Newsflash (Score:4, Informative)
Re:Newsflash (Score:5, Informative)
Re:Newsflash (Score:2)
"This program is not authorized by Sprint. Sprint is not liable for any damage it may cause to the phone. Proceed?"
(Or something like that...)
And that's just a J2ME phone... no Windows Mobile anywhere near there.
Re:Newsflash (Score:5, Informative)
I don't have any specific phone. I write/design platform code for them, which is why I make broad general statements. DRM is coming more and more, TPM chip or not. My point wasn't that "Oh, it's already here, so let's just accept it" as someone said in a reply. My point was that the fact that TPM chips are coming doesn't really change much. There's DRM without them to, and it's still bad.
Re:Newsflash (Score:2)
Re:Newsflash (Score:2)
Re:Newsflash (Score:2)
And to be honest I like my current workplace to much to go on a wild goose hunt to the US. We score a fair 10-11 on the Joel Test. 12 would be nice, but hey, can't get everything. And I get to do fun stuff, that "normal" people actually use, instead of writing internal company software, banking software or something equivalent.
So don't take my MS-dreams
Re:Newsflash (Score:3, Insightful)
Re:Newsflash (Score:2)
It is true... (Score:5, Insightful)
The scariest part about this is, consumers will probably go for these systems as they will be hassle free, safe and free of worry. The only worry consumers will have is that the content of these systems is not only controlled for their own protection but also controlled to limit what they can and can't do, for alot of people I think the costs will be outwayed by the benefits.
Re:It is true... (Score:2, Insightful)
It all depends on how it's done (Score:3, Insightful)
It all depends on how it's done. A chip that prevents the device from running any software not approved by some corporation protects against malware no better than a system which only runs software explicitly approved by the user, except in case of trojans. Add some sandboxing that only allows software to access resources that the user explicitly enabled access to, and you have a pret
Re:It all depends on how it's done (Score:2)
A system which is impossible to modify is a good candidate for being a secure system. It also has limited usefulness.
The security requirements for a system which can be modified take us to another level. Provided a system meets those requirements, there is little need to distinguish between software approved by a vendor and software approved by a user.
Could? More like will. (Score:5, Interesting)
Ended up having to search the net and find some utilities to hack it. Even if you got a utility to directly access the file system and added something, it wouldn't be usable on the phone, you had to alter data files. It was quite clearly a deliberate lockout.
With this sort of thing, they'll just step it up to the next level.
Re:Could? More like will, LINUX hacker (Score:2)
The DRM fits the "customer is a schmuck from whom we suck our pound of flesh, one ringtone at a time."
The phone companies are living and dying on their ringtone money these days, right? I can imagine that smart folks said, "well, if the phone guys want a long-term micropayment system, let's just load it up with DRM, and then they can suck to their cold-hearted heart's content."
It got me to reflecting that the average Linux hacker couldn't be more put off by DRM, other
Ads are my only concern. (Score:3, Insightful)
In NYC the ads would be destroyed. (Score:2)
The WORST part of "Minority Report" was the store Tom Cruise went into after he got his eyes replaced (and that kept mis-identifying him.)
Verizon (Score:1, Interesting)
DRM is bound to die... (Score:5, Interesting)
Picture this - all mobile manufacturers will start shipping DRM enabled phones. Manufacturers will tie-up with content providers, and most of the content being provided will be DRMed.
After a sizeable number of consumers are stuck with DRMed schmuck which makes them pay $$$ for every time they press a button on the phone... there'll be a HUGE demand for a non-DRMed phone.
At that point of time if any company comes up with a non-DRMed phone with enough non-DRMed content to make the consumer moderately happy - it will strike gold!
For this to work - consumers need to unhappy about DRM... that's almost like a social revolution - and revolutions take time!
Nandz.
Re:DRM is bound to die... (Score:5, Insightful)
What's much more likely to happen is that DRMed and non-DRMed products will coexist in many markets; especially the ones that are easily accessible to hobbyists. If, indeed, enough people get turned off of DRM, that will merely create a healthy market for products with lighter or no DRM, but this will be in addition to the market where people don't care if there's DRM or not.
Re:DRM is bound to die... (Score:2)
I don't think that word means what you think it means.
Re:DRM is bound to die... (Score:2)
When you say in one sentence that something is about to occur (imminent), and then in the next that it may take some time, you contradict yourself. Imminent implies immediacy. I believe the word you were looking for is inevitable.
Sorry, I didn't mean to nitpick- It's just that as I read your post I heard a Spanish accented voice in my head saying "You keep using that word. I do not think it means what you think it means."
Pay more attention. (Score:1, Insightful)
TPM won't protect you from viruses and worms. The idea it will is just one of Microsoft's lies. What TPM means is that when viruses and worms strike, the viruses and worms will be able to do things-- like lock away your files for ransom in the "copy protected" part of the hard drive-- that you will be literally unable to fix.
This is really old news... (Score:2)
This has been in the publicly posted spec since 1.2...several months now. Guess no one reads the spec.
Security (Score:4, Insightful)
Re:Security (Score:2)
Think again.
In your example, the only one being protected is the cell carrier. There is no way, at least not in the USA, that they could get away with holding you liable for a trojan-dialer that
Re:Security (Score:2)
Dial out without your knowing about it. (Score:2)
Yeech. What an imagination I've got.
The key is 'your phone book.' Then again, it would be trivial to have it email a message containing your phone book to a central location and come up with a map of 'who knows who.'
Re:Security (Score:2)
Chances are - you won't be the only customer to be affected. If they willfully ignore a pattern among their customers the cell provider would probably find themselves on the other end of a sucessful class action lawsuit.
Re:Security (Score:2)
"You are responsible for all calls and data traffic originated from your phone."
Yep, you're not liable for that... Pshht...
Re:Security (Score:5, Insightful)
And when the DRM is in-place, you're being charged exhorbant fees for any little bit of code you might want to use (ringtones, backgrounds, programs, etc), and yet your phone isn't any more secure, even blocking you from installing a program to REMOVE the virus/worm... Then what?
Re:Security (Score:5, Insightful)
No. The TPM is specifically designed to be secure AGAINST THE OWNER, and something is only DRM if it is trying to be secure AGAINST THE OWNER.
You could get all of the same owner benefits that you want from an otherwise identical system except where you were allowed to know your own master keys. Since it would be essentially identical hardware it would have identical capabilites to protect you, however since you know your master keys the system is not secure against YOU. You could use your key to unlock anything if you wanted to, and you'd be able to control the system if you wanted to. However it would then no longer be a Trusted Platform Module. It would no longer be "Trusted" because the very meaning of "Trusted" is that they Trust it to be secure AGAINST YOU. That they Trust your own property will enforce things like DRM AGAINST YOU.
-
Re:Security (Score:2, Interesting)
bugs suddenly disappear: miracle ! attestation (Score:2, Insightful)
Miracle ! You put a DRM chip and then suddenly, the numerous OS and application bugs exploited by crackers and viruses disappear !
The only new thing provided by a TPM is "remote attestation", and I call it Big Brother.
http://en.wikipedia.org/wiki/Trusted_computing#Rem ote_attestation [wikipedia.org]
Unlike PCs, mobiles are not open (Score:2)
Rent VS own all over again (Score:5, Insightful)
I simply do not accept to pay when buying something with DRM as if I were buying it but am in reality RENTING IT.
By that I mean that if I BUY an apartment, then I am allowed to paint the walls the color that pleases me because it is MINE, I own it and can do as I please with MY apartment. However, if I RENT an apartment, then I must ASK the OWNER of the apartment for his/her permission to paint the walls. If I own it I do not need to ask, it is mine to do as I please. If I rent, then it is NOT mine and I must ask the REAL owner.
Now, with DRM, I am paying like I am buying, I am told I am buying, but the reality remains I still have to get someone else to give me permission to do as I please with my device. And if I have to do that, then I do not feel like I am the real owner.
We already have this... (Score:3, Funny)
"Verizon Wireless".
This is different from status quo? (Score:2)
Re:This is different from status quo? (Score:2)
Heavy duty TPM encryption can enable such things as biometric (e.g. fingerprint) signing of EULA acceptance for DRM-governed purchases. The existing cellphone technology includes a EULA as part of your service contract (with its own nasty provisions for early termination, etc...), but this way they can hold you to each agreement individually and so have a lot more room to play with variations on the le
Why do so few people understand TPMs??? (Score:5, Insightful)
I've worked quite a bit with the technology, and it's not all THAT complicated.
Over-stating what a TPM can do is common from the pro-trusted computing industry. Statements like "It should prevent the phone world from being hit by the same virus and hacking issues that face computers" are just ridiculous (I saw a press release one time that claimed they'd protect people from phishing too!).
Simply put, a TPM does nothing -- nada, zilch -- to prevent viruses or external threats that you can't do in software with no hardware trusted platform additions. OK, you might make the argument that you're just adding another layer for defense in depth, but how about making the software better in the first place?
The only -- yes, only -- extra capability given by a TPM is the ability to protect from local attacks. Meaning attacks from people with physical control over the hardware. Now before the "anti" side runs off and raves about how the TCG is trying to take over their computer, keep in mind that (a) it's optional and (b) there are applications where this makes complete sense. Ignore the DRM side of the issue, and there are still good applications. Imagine playing on-line games and having some assurance that your opponents aren't using hacked up clients that allow them to cheat. Imagine connecting to a peer-to-peer network where the peer you're connecting to can give assurance that it's not a hacked, fake RIAA node. For the cell phone, the obvious point is that it makes cell phone cloning exteremely difficult. None of those are bad things.
If you don't like DRM, then don't accept stores or software that enforce it. And don't mistake every single issue as content providers trying to restrict what you can do.
Re:Why do so few people understand TPMs??? (Score:2)
Optional for the manufacturer, not you, the sucker known as the "consumer"
and (b) there are applications where this makes complete sense.
Benefits of none of which even begin to approach the cost of societal downsides of Trecherous Computing, never you mind surpassing them.
If you don't like DRM, then don't accept stores or software that enforce it. And don't mistake every single issue as content providers trying to restrict what you can do.
Brilliant. And what if every
Re:Why do so few people understand TPMs??? (Score:2)
Your own very examples of "positive" use of DRM were .... all about the "contents producer"
First, I didn't use even a s
Re:Why do so few people understand TPMs??? (Score:2)
Only the entire future of computing, free exchange of ideas and open source depends on this. Possibly the direction of Western Civilization. So you are right, we are getting "worked up" for no good reason at all.
And I love the irony that many of the same people who scream about the evils of "Treacherous Computing" are exactly the same people who, when the topic is changed to peer-to-peer technologies and the RIAA efforts against those, make the
Re:Why do so few people understand TPMs??? (Score:2)
Anyway, to your final questions: You are precisely correct that secure DRM is impossible without TPM-like technology, and that TPMs will enable the ability to make secure DRM. I never said anything that would contradict that.
My point was that TPMs also enable many other very useful things. And even with a TPM chip in your system, YOU have full control over what applications yo
Re:Why do so few people understand TPMs??? (Score:2)
Re:Why do so few people understand TPMs??? (Score:2)
Wrong. It's quite functional.
The very fact that your Thinkpad (I assume) still runs non-TPM authorized software, nixes the whole concept, right there, as that software can be used to do all sorts of stuff, including virtualization of the TPM hardware, for the purpose of circumventing it.
It does not nix anything at all, just shows that you don't really understand what TPMs do and
Re:Why do so few people understand TPMs??? (Score:2)
There is a programmer who makes a P2P software. Lets call him Bob. Bob decided to use TPM to ensure "trusted collaboratio
Re:Why do so few people understand TPMs??? (Score:2)
Wow.
Having met the real person behind the "Dr. Blue" pseudonym, I can say with absolute confidence that he knows more about cryptography and cryptographic systems than either you or I, and quite possibly knows more about it than anyone else on this message board.
Perhaps you should study a little more (at least get a doctoral degree in a relevant fiel
Re:Why do so few people understand TPMs??? (Score:2)
If you're ever out in this area again, stop by and visit. We've got a nice new building and research facility with new offices and labs. I'll give you the "grand tour"....
Re:Why do so few people understand TPMs??? (Score:2)
Re:Why do so few people understand TPMs??? (Score:2)
Amusing. Perheaps you should check the end result of that little conversation I had with Dr. Blue in the other thread, the one in which he admitted that the TPM effectively gives means to Microsoft and others to lock GPL folks out of the Internet, among other, his words "pre
Re:Why do so few people understand TPMs??? (Score:2)
Dream on these vivid daydreams, it suits you so well.
You are not merely wrong on occasion. From what I've seen, you're nearly always wrong, and loudly so. You do not pick your fights carefully; as far as I have seen, you have yet to pick a fight that you could win. You are the fool. You
Re:Why do so few people understand TPMs??? (Score:2)
Gee, maybe I should go out and study some on the subject. Seriously, I haven't been the most polite in my postings to you, so I can forgive the rudeness, but just so you know a little more about who you're talking to, I am an expert in public key cryptography, and outside of the industry TCG people there are probably fewer than 10 people on the planet who understan
Re:Why do so few people understand TPMs??? (Score:2)
Since I base my observation on the utter bullshit you are attempting to feed me, this chest-beating is doubl
Re:Why do so few people understand TPMs??? (Score:2)
Actually, I have proved my point, many times over. You don't realize it because it contradicts your concept of what trusted platforms do and how they work, so you think it's B.S. The contradiction is there, but only because it is your concept of trusted platforms that's wrong.
As I pointed out already, this would not work on its own without a complete host OS lockdown. For the "isolated" proces
Re:Why do so few people understand TPMs??? (Score:2)
I will file that under "wishful thinking" on your part.
So in the P2P example, when the trusted process asks the OS to send a certain packet to 1.2.3.4 it could indeed be intercepted and be sent to 10.20.30.40 instead. Or it could in
Re:Why do so few people understand TPMs??? (Score:2)
New to this? No. I'd bet I was doing this kind of stuff before you were even born. But you're right: you can indeed make the P2P client go bye bye. That's what I meant by a DoS attack. But i
Re:Why do so few people understand TPMs??? (Score:2)
That is not what I meant. A real Black Hat would use the modified malloc() to allocate memory blocks outside the protected memory area and then manipulate them. memcpy() would be used to intercept memory block manipulations within the "protected" area to inspect
Re:Why do so few people understand TPMs??? (Score:2)
Re:Why do so few people understand TPMs??? (Score:2)
Except you disingenuously ignored the fact that I would have to throw away my "hacked up" kernel (and by extension my hardware) to "conform". Because unlike multiple versions of libraries, I now am allowed to have only one "approved" version of that, no?
Now stop your ranting -- that could
Re:Why do so few people understand TPMs??? (Score:2)
The bottom line is this: Trusted platforms allow you to have a verifiable executa
Re:Why do so few people understand TPMs??? (Score:2)
False. They provide a particular type of "verifiable execution environment", one which is designed with specific implications in mind, and it is those implications, of that particular design which count!
On a hardware box with trusted platform support, you could (a) opt out entirely and it would work just like today's computers,
And b
Re:Why do so few people understand TPMs??? (Score:2)
And there's the most fundamental difference. I personally see the technology as potentially very empowering, and in fact increasing Liberty for the users. You believe the exact opposite. And that's why we'll probably never see eye-to-eye on this, but maybe in another 20 years we can compare notes.
Re:Why do so few people understand TPMs??? (Score:2)
That is probably most insightful observation you have made in this entire discussion. I fully agree. I do admit the very remote, from the perspective of my cumulative experience, possibility of this actually someh
Re:Why do so few people understand TPMs??? (Score:2)
And there's the most fundamental difference. I personally see the technology as potentially very empowering, and in fact increasing Liberty for the users. You believe the exact opposite. And that's why we'll probably never see eye-to-eye on this, but maybe in another 20 years we can compare notes.
That is probably most insightful observation you have made in this entire discussion. I fully agree. I do admit the very remote, from the perspec
Re:Why do so few people understand TPMs??? (Score:2)
Re:Why do so few people understand TPMs??? (Score:2)
Yes. Dr. Blue has informed us that "verification of trust" between peers is so paramount that it should take precedence over competition and interoperability, which he at present believes to be in no particular danger because software makers -- Microsoft chief amongst them -- "strive for interoperability" with their competitors. Your contribution to the discussion was something along the lines of "Dr. Blue is
Re:Why do so few people understand TPMs??? (Score:2)
It is not inconsistent to argue in support of personal freedoms in both cases (TCG implementation and use of P2P technologies by consumers).
The argument here is not which technology makes us smile from ear to ear, it is how to preserve our rights against constant assaults, which I think is a little bit more impor
The phone companies are going to LOVE this (Score:2)
Although the real answer is simple, dont buy phones with this stuff in it.
think for a moment.... (Score:2)
what the hell are people smoking?
asking someone else for permission to Execute Arbitrary Code on your PROPERTY!!!
if the phone isn't a rental, then it belongs wholly to you. as in your property and i'll be damned if they can get away with this for much longer.
Re:think for a moment.... (Score:2)
Re:think for a moment.... (Score:2)
first, you educate people about the evils of selling merchandise and then treating it like a rental. (aka DRM / Insidious Computing).
second....
Well they're already way too restricted (Score:2)
But then again, maybe
Re:Strange connections... where's this leading? (Score:2, Informative)
Re:Strange connections... where's this leading? (Score:2)
It must be leading to a secret plot for world domination by Microsoft... or the conclusion that you've fabricated a bunch of nonsense to jack up your karma.
Re:Redundant (Score:2)
Baka.
Find the software using your computer's internet connection. The unmetered one. Then, once you've identified the exact URL, fire up your phone and WAP it down.