Rich Freeman on 10 Feb 2018 19:39:03 -0800


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] plug Digest, Vol 159, Issue 16


On Sat, Feb 10, 2018 at 10:30 PM, brent timothy saner
<brent.saner@gmail.com> wrote:
> On 02/10/2018 10:22 PM, Rich Freeman wrote:
>
>> Within the PC the TPM-based solution would work by ensuring the key is
>> only released when trusted software is running.  The trusted software
>> wouldn't have the ability to copy the data anywhere, and the screen
>> contents would be protected as well within the computer hardware.
>
> the technology to thwart this exists longer than this itself, as you
> mentioned.
>
> https://i.imgur.com/E6Buus3.jpg
>

Sure, and that is why I mentioned it.

However, TPM-based solutions have applications beyond this one trying
to protect a single tax form.  They're commonly used to implement
full-disk encryption all over the place and I figured that people
might be interested in how they work in this context.

> i do not think OP is interested in hypotheticals or theory, i'm fairly
> certain they were interested in practical and pragmatic application.

And that would be why I implied that this wasn't practical in my very
first email.  This was an entirely hypothetical exercise, and the
first two lines of my email summed up the state of common software
that purports to do this sort of stuff.

-- 
Rich
___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug