Rich Freeman on 10 Feb 2018 19:39:03 -0800 |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: [PLUG] plug Digest, Vol 159, Issue 16 |
On Sat, Feb 10, 2018 at 10:30 PM, brent timothy saner <brent.saner@gmail.com> wrote: > On 02/10/2018 10:22 PM, Rich Freeman wrote: > >> Within the PC the TPM-based solution would work by ensuring the key is >> only released when trusted software is running. The trusted software >> wouldn't have the ability to copy the data anywhere, and the screen >> contents would be protected as well within the computer hardware. > > the technology to thwart this exists longer than this itself, as you > mentioned. > > https://i.imgur.com/E6Buus3.jpg > Sure, and that is why I mentioned it. However, TPM-based solutions have applications beyond this one trying to protect a single tax form. They're commonly used to implement full-disk encryption all over the place and I figured that people might be interested in how they work in this context. > i do not think OP is interested in hypotheticals or theory, i'm fairly > certain they were interested in practical and pragmatic application. And that would be why I implied that this wasn't practical in my very first email. This was an entirely hypothetical exercise, and the first two lines of my email summed up the state of common software that purports to do this sort of stuff. -- Rich ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug