Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> I'm yet to hear a reason for why I, as an user, should like to have a TC platform.

When you are in control of the trusted keys loaded in your machine, this allows you -the computer user- to defend against several classes of attacks, including many Evil Maid attacks.

Many Linux distros and most open source security software projects sign their releases for a really good reason.

"Trusted Computing" takes this a step further by pushing this signature verification into a tamper-resistant part of the computer, and verifying everything on the system, including (on some systems) the bootloader and the UEFI firmware.

It's only when the end-user doesn't have control of the trusted keys loaded into his computer that TC becomes something that can be used for great evil.



Gotta love how mucking around with the boot sector has come back in vogue in -sec circles.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: