Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

How the iPod Will Change the Face of Computer Security (via Digital Rights & Trusted Platforms)
Addison-Wesley Publishing ^ | 01 December 2005 | Bruce Potter

Posted on 01/09/2006 1:38:08 PM PST by Stultis

How the iPod Will Change the Face of Computer Security

Date: Dec 1, 2005 By Bruce Potter.
Apple probably didn't intend it, but the iPod will likely prove to be an important stepping stone into solving a problem that has faced computer scientists for more than 30 years. Bruce Potter explains.

The iPod has caused a bit of a revolution in the music industry. By making the iPod incredibly user-friendly and providing affordable content, Apple has put more than 28 million iPods in the hands of consumers all over the world (with 10 million more expected to be sold before Christmas 2005). Consumers now expect that they can access legal music on demand for a dollar a song rather than having to go to the store to buy a CD for $15. And with the iPod you can listen to your massive music collection at home, in your iPod-enabled car, at the office, and at friends' parties. No more messing around with CD binders or a laptop full of music.

None of this is a surprise. We're all familiar with the iPod and its impact on society. It has become a household name. But from a security perspective, the iPod hasn't created the same ripple. Why should it? After all, it's simply a consumer electronic device.

Or is it?

Gartner issued a report in 2004 on how an iPod can be used to remove data from a corporate network. The iPod does double duty as a USB mass storage device and can serve the same role as a USB pen drive, but looks much more stealthy. Many people discounted Gartner's report, however, because USB storage tokens come in all shapes and sizes and it seems silly to single out the iPod for this purpose.

The big impact that the iPod will have on computer security is still in the future. Apple probably didn't intend it, but the iPod will likely prove to be an important stepping stone into solving a problem that has faced computer scientists for more than 30 years.

Controlling Data

Controlling access to data and resources is essentially the foundation of computer security. Many methods and mechanisms can be used to accomplish this type of access control, but historically they're generally software-only solutions. Further, most access control mechanisms are vulnerable to software bugs and implementation errors that can lead to data compromise. Also, these access control mechanisms must trust the environment or host on which they're running, in order to control access to data. If the host itself is compromised, the access control provided by the software is generally completely violated.

In 1971, Butler Lampson authored a paper titled "Protection," in which he puts forth the idea of multiple domains of information running a on a single host. The general idea is that each domain would execute independently and with potentially different rights existing for programs in each domain. Lampson's ideas became a sort of Holy Grail for computer scientists—provable separation of data and processing running on the same host.

Lampson's vision has many implications. For many years, the U.S. Department of Defense has pursued multi-level security (MLS) systems, in which data from different classification levels could be examined and processed on one system. In current systems, data from multiple classification levels must run on different computers because existing security mechanisms are not strong enough to keep data separate. For content providers such as record companies, Lampson's idea will allow them to ensure that their content is accessed only in a manner of which they approve. For instance, a system that has these domains implemented could enforce that MP3 files be read only by trusted and authorized programs.

The problem with reaching Lampson's vision is that it's nearly impossible to achieve complete control of data with a software-only solution. Complex software is difficult to create in a 100% secure manner; therefore, the access control mechanisms are not fully trustworthy. Also, the access control mechanisms themselves are complicated and require interaction with the user, the data "owner," management entities, etc.... It may look simple on paper, but Lampson's vision has been elusive for more than three decades.

The iPod and DRM

Search for digital rights management (DRM) on Google, and you'll find as much technical information as opinion on why it's a bad idea. In a nutshell, DRM is the concept of controlling access to content and media. It's the ability to enforce the rights of a content creator (or manager) on a piece of data. For example, if I create a book, I may wish that only people who had paid for the book could read it. In the physical world, the idea is pretty straightforward. In the electronic world, however, it's difficult to enforce.

Over the last few years, there have been many attempts at implementing DRM, and in general there has been incredible push-back by users. In 1999, Intel put a unique serial number in the Pentium III chip in an effort to help individually identify computers. Since the serial number was not tied directly to any one DRM mechanism, there was quite an outcry against Intel. The serial number was seen as a way to track users and felt like a "Big Brother" maneuver. Intel was eventually forced to remove the serial number from future chips due to public pressure and legal battles.

The lesson from the Intel serial number incident is that a DRM mechanism without a benefit for the user is going to meet a huge amount of resistance. The iPod and iTunes Music Store (ITMS) provide a counterpoint to the Pentium III serial number. To convince the major record labels to put their content on ITMS, Apple had to provide reasonable assurance that the music wouldn't be easy to pirate. Apple created a DRM mechanism that, in general, has kept piracy to a minimum. (In reality, Apple has been in a cat-and-mouse game with some very skilled security researchers who have repeatedly broken their DRM mechanism. However, the amount of piracy attributable to these attacks is minimal.)

So why have users adopted DRM so readily in the case of the iPod? In a nutshell, Apple found the killer app for DRM. Users can get music cheap and take it anywhere they want. By July 2005, Apple had sold more than 500 million songs on ITMS. Consumers have spent more than a half billion dollars on DRM'd media, effectively giving DRM a stamp of approval. Apple made DRM cool with the iPod.

Apple Switches to Intel

So the next piece of the jigsaw puzzle in realizing Lampson's vision is Apple switching to Intel. Apple has historically kept a stranglehold on their hardware. For a few years when Apple was really on the ropes, they allowed a competitive market to form around their hardware business. But once they were back on solid ground, they stopped all that and have been the only hardware provider for their software for the last seven years.

Part of how Apple enforces "users run Apple software on Apple hardware only" is by having a proprietary and relatively obscure hardware platform. Apple's operating system has been created to run on the PowerPC set of chips for the last decade, and with only a limited set of supporting hardware. This fact has kept even underground competition from affecting Apple's market or their products.

However, in June 2005, Apple announced that they would switch to Intel hardware. This change affects the landscape dramatically. In theory, a user would be able to buy a general-purpose PC and load OS X on it, thereby breaking Apple's rule of "users run Apple software on Apple hardware only." How will Apple keep control of their own hardware market?

Apple has already made DRM cool by providing value to the consumer, so now they're going to extend that idea. Apple is looking to use the Trusted Computing Group's Trusted Platform Module (TPM) to tie Apple software to their hardware. The TPM provides a cryptographic mechanism to prevent an unauthorized operating system from booting. Further, the OS can look for the TPM and, if it isn't found, the OS could refuse to boot.

The Trusted Computing Group (and its TPM) has been the target of privacy advocates for years. The TPM has been viewed as another example of evil technology that can be used and abused by corporations to repress the rights of the users. The reality is that TPM-enabled systems will probably be the foundation of the next giant leap in computer security. It's impossible to convince users to give up their privacy for the sake of security. Users will, however, give up their privacy if their life has been made better somehow, likely through entertainment. Apple on the Intel platform will probably make the new system so attractive for users that they'll happily overlook the TPM core of the machine.

Also, the TPM has not yet seen wide deployment. Software developers haven't had a chance to get used to programming to the TPM. Security researchers haven't had a chance to really poke holes in the Trusted Computing Group's architecture. And security engineers have not had a chance to figure out how to fully leverage the capability of a TPM-enabled system, especially at the enterprise level. Once Apple makes the switch to Intel, more than 2 million TPM-enabled hosts will probably be shipped by Apple in the first year. This will be a massive deployment of the Trusted Computing Group's architecture and give developers, researchers, and engineers the chance to beat on the technology.

Everyone Benefits

Apple will provide the trial by fire that the Trusted Computing Group's architecture needs. Once Apple has proven that it's technically possible to tie software to a hardware platform and win over users, other providers will follow suit. Specifically, Microsoft will have the road paved for them by Apple's maneuvers. They'll be able to integrate Windows onto a trusted platform and provide much higher-level trusted functionality than Apple will be able to give.

Ultimately, having a trusted platform on which to run general-purpose operating systems will result in totally new security capabilities. For the first time, transactions that are committed on a network can be traced all the way back to the trusted booting process and application launch on a specific host. Enterprises will be able to have much finer-grained information regarding the integrity of systems on their network. Users will have greater ability to prevent unauthorized programs from running on their PCs. And content creators will have greater assurance that their products and services are being used in the manner in which they intend.

Parting Shot

For the future of computer security, the iPod has been critically important from a societal perspective. Apple has made a controversial technology socially acceptable, thereby paving the way for greater capabilities. Putting DRM into the hands (and cars and offices and...) of millions of users, Apple has helped computer security to take a giant leap forward. The iPod has laid the groundwork for Apple to take another giant step—this time with the integration, and ultimate acceptance, of the Trusted Computing Group's architecture. And once Apple gets users onboard with the Trusted Computing Group, the rest of the software and hardware world will follow, allowing completely new uses and applications of computer security.


800 East 96th Street Indianapolis, Indiana 46240


TOPICS: Business/Economy; Culture/Society; Extended News; Miscellaneous; News/Current Events; Technical
KEYWORDS: apple; computersecurity; drm; ipod; tpm
Navigation: use the links below to view more comments.
first 1-2021-4041-46 next last

1 posted on 01/09/2006 1:38:14 PM PST by Stultis
[ Post Reply | Private Reply | View Replies]

To: Stultis

Do what we do here, we lock out the USB's from all users but those with admin access. Same with cd's.


2 posted on 01/09/2006 1:39:26 PM PST by TXBSAFH ("I would rather be a free man in my grave then living as a puppet or a slave." - Jimmy Cliff)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Stultis

I just posted on another thread my befuddlement re: ipods. It's an mp3 player, right? What's all the hype for? I don't get it. What's so special about it? And there are other places to buy music online, like real rhapsody. What makes ipod such a must have?


3 posted on 01/09/2006 1:41:43 PM PST by Huck (Don't Vote: It only encourages them.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TXBSAFH

That doesn't work in most environments. In our offices, our input devices, printers, scanners, and other equipment are all USB or Firewire, so locking out USB from non-admins essentially makes the computer nonfunctional. Connecting a USB device is merely a matter of unplugging the printer and plugging in your USB fob. I have a 5Gb USB flash drive on my keychain and could copy most of our client data in about two minutes if I were so inclined.

Since most HW manufacturers are moving away from PS/2 as a viable plug option for input devices, this problem is going to get far bigger.


4 posted on 01/09/2006 1:45:08 PM PST by Arthalion
[ Post Reply | Private Reply | To 2 | View Replies]

To: Huck

Good question. I don't have iPod myself, so I'd be interested in the explaination also. I presume it just makes things easier/faster/more-user-freindly that could be done on other equipment as well?


5 posted on 01/09/2006 1:46:38 PM PST by Stultis (I don't worry about the war turning into "Vietnam" in Iraq; I worry about it doing so in Congress.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Huck
The ipod can be used as a mass storage device, too in addition to an mp3 player.
6 posted on 01/09/2006 1:48:57 PM PST by dhs12345
[ Post Reply | Private Reply | To 3 | View Replies]

To: Huck
What's all the hype for? I don't get it. What's so special about it?

This question was answered at the beginning of the article, actually: "By making the iPod incredibly user-friendly and providing affordable content..."

It's really that simple. Apple was the first company to combine a user-friendly design with easily-accessible content, and combined music and iPod management into iTunes. The iPod is good hardware, and iTunes is good software. The end user is willing to pay for quality. Thus, the iPod sells.
7 posted on 01/09/2006 1:50:47 PM PST by Terpfen (Miami goes 9-7! Go Saban!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Huck

It's mostly the seamless integration of the system, though Apple did do a great job coming up with a seamless interface. You pop up your iTunes application, pick your song, and the whole thing automatically downloads and installs itself. No messing with transfers or quibbling over what folders to hide your songs in. The iPod made downloading music to the player easy for those who don't know, and more importantly don't care, how it all works on the backend. They just want to pick a song and go, and Apple was the first to deliver it.

For the technically knowledgeable user, the iPod offers nothing that other players and services don't. For everyone else, it offers "pop the CD in" convenience of a CD walkman without the annoying skips or the hassle of changing disks.


8 posted on 01/09/2006 1:51:03 PM PST by Arthalion
[ Post Reply | Private Reply | To 3 | View Replies]

To: Stultis

Why does this writer have a job?? Why didn't he come right out and say what he was trying to get across? Tell them what you are going to tell them, tell them, tell them what you told them....

Readers shouldn't have to struggle to get the point!!!
</rant>


9 posted on 01/09/2006 1:51:07 PM PST by Ecliptic (Keep looking to the sky)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Stultis

See #7.


10 posted on 01/09/2006 1:51:09 PM PST by Terpfen (Miami goes 9-7! Go Saban!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Huck

marketing.


11 posted on 01/09/2006 1:53:07 PM PST by chilepepper (The map is not the territory -- Alfred Korzybski)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Stultis

the reason why the public won't buy into DRM - its has to be EVERYWHERE to be effective, and allow the consumer to move seamlessly from device to device. From the TVs in my house, recorded to my Tivo, DVDs I want to play in the house in multiple rooms, take into the player in the minivan, play on a portable device, music in the house, the car, etc. There is no single signed hardware solution that is going to cover all these possibilities - people don't want to carry around some kind of "DRM key" that they have to plug into their various devices to authenticate them so they can play their purchased media.


12 posted on 01/09/2006 1:54:46 PM PST by oceanview
[ Post Reply | Private Reply | To 1 | View Replies]

To: Stultis

"Apple has already made DRM cool by providing value to the consumer, so now they're going to extend that idea. Apple is looking to use the Trusted Computing Group's Trusted Platform Module (TPM) to tie Apple software to their hardware. The TPM provides a cryptographic mechanism to prevent an unauthorized operating system from booting. Further, the OS can look for the TPM and, if it isn't found, the OS could refuse to boot."

Could this be the death knell of open source?


13 posted on 01/09/2006 1:55:36 PM PST by taxed2death (A few billion here, a few trillion there...we're all friends right?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Arthalion

Agreed on the ps2, but everything is networked here so it works for now.


14 posted on 01/09/2006 1:57:14 PM PST by TXBSAFH ("I would rather be a free man in my grave then living as a puppet or a slave." - Jimmy Cliff)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Ecliptic

Maybe it's that the headline doesn't match the point of the article...what does the iPod being user friendly have to do with security in the future???


15 posted on 01/09/2006 1:57:49 PM PST by Ecliptic (Keep looking to the sky)
[ Post Reply | Private Reply | To 9 | View Replies]

To: oceanview
And there is the big brother aspect to it, too.

I don't pirate mp3. However, it bugs me whenever software keeps track of the number of copies I have made. I owned a Sony MP3 player that kept track of all copies made. I took it back.
16 posted on 01/09/2006 2:00:02 PM PST by dhs12345
[ Post Reply | Private Reply | To 12 | View Replies]

To: Huck

"I just posted on another thread my befuddlement re: ipods. It's an mp3 player, right? What's all the hype for? I don't get it. What's so special about it? And there are other places to buy music online, like real rhapsody. What makes ipod such a must have?"

Answer: awesome marketing.
That's how you get people to pay 30%-50% MORE for something with a branded name versus the same thing from a relative "unknown" manufacturer.

Just proof of how gullible some people are.


17 posted on 01/09/2006 2:00:46 PM PST by taxed2death (A few billion here, a few trillion there...we're all friends right?)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Stultis
FYI for music fans - allofmp3.com - the DMA specifically allows for individuals to import music for their own uses. A dollar a song? Ha. A dollar a CD. :) Imports into iTunes just fine for those who so desire.
18 posted on 01/09/2006 2:01:04 PM PST by kingu
[ Post Reply | Private Reply | To 1 | View Replies]

To: taxed2death

MSFT and Intel already have that targeted with LongHorn, similar approach to the software/hardware relationship that the XBOX uses - the software can only run on signed hardware.

when this happens, the chinese will make an Intel chip clone without DRM to allow open source OS to run on them.


19 posted on 01/09/2006 2:02:20 PM PST by oceanview
[ Post Reply | Private Reply | To 13 | View Replies]

To: kingu

is that the russian site?


20 posted on 01/09/2006 2:02:48 PM PST by oceanview
[ Post Reply | Private Reply | To 18 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-46 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson