Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: rarestia
I'm talking about an evanescent ghost session. A session that starts, reads the TPM through whatever artifice, then shuts down and allows the system to start the real session.

A lot can happen in a tenth of a second on a 1 GHz processor.

The user would never notice that the start-up was a bit slow this one time.

Better, do it at a shutdown where winders is installing updates. No one ever knows how long that's going to take!

109 posted on 08/22/2013 10:33:58 AM PDT by null and void (Frequent terrorist attacks OR endless government snooping and oppression? We can have both!)
[ Post Reply | Private Reply | To 105 | View Replies ]


To: null and void

Okay, you’re talking about at boot time? Well, again, the password would have to be known to pass to the TPM to access it. Also, the TPM is not exclusively reproducible. The hash must accompany the data or it can’t be decrypted.

Now, speaking directly to the article, the problem with Win8 is Secure Boot. Secure Boot completely takes over the EFI boot mechanism. This essentially mates the hardware to the software. With EFI usurped, now the TPM can be activated and locked down by the software install as opposed to the user. THIS is why the Germans want to divest themselves of Win8, and I absolutely cannot blame them.

Listen, I’m not standing up for MS or Win8. I’m standing up for the TPM. It’s great technology and makes cryptology a little bit easier for the home user IF the TPM is managed by the user himself. Since Secure Boot destroys the user’s ability to secure his own bootloader and also destroys his ability to secure his own TPM, Secure Boot, and Windows 8, destroys privacy in general.


110 posted on 08/22/2013 10:40:21 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 109 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson