Friday, April 9, 2010

Google Chrome OS - take chromium and Trusted Computing?


Image : http://www.flickr.com


For an exciting development that should come from the recent announcement of Google Chrome compatibility with computer operating system trusted by the Trusted Platform Module (TPM) chip in the basic specification is based on the news, but first a little later. There are two operating systems such as chromium and chromium OS OS both support TPM, and the two are essentially identical, reflecting similar Chromium and Google Chrome web browser. The version of Chrome is the Google brand,Chrome is open source to the public, but in theory the same code base. From here, I will use the familiar notion of Chrome, but the current version of browser and operating system chrome.

What operating system and TPM Chrome give us?
Trusted Computing and TPM has bad image of the Open Source fans, many fans like Google for MPR in the new operating system brings a bit 'of cognitive dissonance. Do not worry,However, Google no harm, and this philosophy is reflected in their approach. First, to support a TPM is only one option, but since Chrome is open source, any supplier of TPM required. Thus, if a TPM is currently the function described, the method proposed by the Trusted Computing Group to implement a load of confidence, a method that produces nothing more than a boot disk using trust records of confidence in the TPM.

This means that the customerApplications and remote servers, can testify to the status of the device and can tell if started in a known state of confidence. Although the point of view could raise his arms in horror at the exit of the third configuration of the TPM, and an operating system, is the advantage for banking applications, for example, where the Bank can verify the TPM Chrome conditions operation and, if it decides that an alien, potentially dangerous for the possibility ofspyware software on the device, deny access to your banking information.

What operating system and TPM Chrome does not give us?
A TPM system does not prevent piracy in order to receive approval for the Google-go, that people not only want to install your OS on the device, but also the firmware, methods are provided to allow the device is restarted under these conditions . Since the TPM is always a liability, there is no way to identify an unexpectedThe operating system or boot firmware and avoid allegations, despite what critics TPM.

In fact, if you can convince a bank that informed and know what they do, they can also provide a way for you to be registered in a state known good configuration of personal computer software system, as in the previous section, the Bank can attest to their staff, the wider the TPM, thus accepting device configuration itself, but the identification of anomaliespersonal settings.

But why a TPM-looking?
In most homes there are probably two different types of devices connected to the Internet. The first is the team, second home electronics such as televisions or game machines. the use of personal computers, TPMS are selling a bit 'heavy, but also for electronic devices at home, you want to just start and do not work, the interest of someone other than just Bog standard output using the dialogPlayStation. One device in Google's new operating system is based more in the second category, you (with you that the average user, not haxx0r leet) I just want this to work.

However, the Internet is a big bad world, and all surfing can expose all kinds of harmful content that can infect the device. With the addition of a TPM in the mix, users have additional assurance that the device is still in a safe and reliable. For example, after the launch of Chromedevice operating system can be TPM status and use this information to decode a message sent to investigate the connection, so if you saw a confused message that you can know the device may not be in the state, and measures for the problem.

Also services you can access the status of the TPM in the operating system, and if the state does not recognize, take measures to prevent illegal access or invalid.

Finally, since each TPM has a unique identityThe device is stolen, it can be put in place systems to blacklist certain devices. A device on the black list may be denied access to services, and (always in mind is not a function of the TPM, but by developers to add an operating system with a TPM), and then offered personally identifiable information to remove the disc or even in the TPM, or even more drastic, broke a switch, but it is not an option very tolerant!

Therefore, to build with TPMa device safe, reliable, easy to use actually works, such as televisions and VCRs, just work, so if Chrome OS-based Tablet, photo frame, laptop, or is that form factor seems to be sure to ask if the seller is a TPM inside the unit.

No comments:

Post a Comment