Showing posts with label Trusted. Show all posts
Showing posts with label Trusted. Show all posts

Sunday, June 12, 2011

Five reasons for the adoption of Trusted Computing


Image : http://www.flickr.com


Trusted Computing technologies is perhaps one of the most misunderstood (willfully misunderstood, really) new computer security. The misunderstanding started Wikipedia on the "Trusted Computing" and is made up of hundreds of articles and links. Of course, there are exceptions valid on the basis that there is a closed chip, and although it can be presented to the open source software, who say that there are no hidden back doors inImplementation. However, a similar argument was made for virtually all computer systems, so if you can get up to overcome mental blocks, here are five good reasons to be excited about "Trusted Computing".

1. Trust-based Full Disk Encryption Computer
There are a number of free (TrueCrypt is the most popular) software solutions to make and pay the full disk encryption, but recently, before it was a lot of bad girls attack on a PCalone in a hotel room on the left is booted from an external hard drive to steal your password. But Joanna Rutkowska things invisible Labs, Microsoft described as BitLocker drive encryption solution can easily be extended so that the user can easily see that the computer has been hacked. If this attack is not bad generated a great concern, and Trusted Computing Group has defined the specifications of the Opal system is fully encrypted hard disk drive, bypassingperformance issues, software solutions. There is no good reason why the unity of your next purchase should not support the specification of Opal.

2. Unified Secure access to your favorite sites
The OpenID initiative has developed a method to connect to many places with a unique password and password, which handles products in one place. This is an excellent initiative, but also for wider acceptance and approval bodies such as banks, which have higher security requirementsand adoption by users, which have increased the security requirements of Wave Systems have a little 'more to protect your password with a platform to build confidence so that the server can be set at the end of the other 'You are indeed the identity, I guarantee when the TPM, and you can be sure that access to services by the only team with the installation of TPM can be done.

3. Network Security
This is afor large companies, perhaps more by the administrator of workers, but. The CNC, Trusted Network Connect has developed a set of protocols for clients IF-MAP Protocol Interface Metadata Access that their status may be questioned, and enables network devices to another network broadcast debate. Although designed for the corporate network, in a family environment as it could identify a person that piracy on the net and toasterclose enough to enjoy your toaster and frying the rest of the prison.

4. Digital Rights Management
Oh, look, I said the word ghost, DRM, mandates that the opponents of Trusted Computing in connection with indignation. However, the fact of the matter is that the companies to offer multimedia content over the network, but do not want to do what they want because they have spent a lot of money content. Trusted Computing and Trusted Platform ModuleThe Internet set-top box, and you have a system that has the potential for "no better than" meet the mantra, as iTunes did for music.

5. Mobile Security
Currently, some phones like the BlackBerry excellent security, which are like the iPhone say they have had, and yet little or nothing. However, the definition of Trusted Computing Mobile Trusted Module, a security chip (or software implementation in a highly secure and reliablesame function), capable of the same features of the TPM, plus a few others to create the world of music. Now, mobile operators have for their ringtones rock solid DRM (yes, you can roll your eyes at this comment!) But above all, their mobile banking can be so sure if this is not certain that the computer bank. The U.S. National Security Agency is also said to look at that, who knows what ...

So, there are five good reasons exciting "Trusted Computing" to get.In some cases above, can be your friend, but Trusted Computing is not the enemy, unless of course he's a pirate! The people who work in the provisions of trusted computing are very talented and some guys, if one of them, even the kids I know are anxious to Microsoft, and locking in their products. In fact, the specific TPM swing back, your privacy is maintained at the expense of functionality!

Wednesday, September 8, 2010

Five reasons for adopting the Trusted Computing


Image : http://www.flickr.com


Trusted Computing is perhaps one of the most misunderstood (willfully misunderstood, to be honest about it) new technologies for information security. The misunderstanding begins with the Wikipedia on "Trusted Computing" and is composed of hundreds of articles and blogs. Of course, there are exceptions apply to the fact that it has entered into a smart, although it can be applied to open source software, who say that there are no hidden back doorsApplication. However, a similar argument was made for almost all computer systems available, so if you can get to overcome the mental block, there are five good reasons to "inspire Trustworthy Computing."

Before Trusted Computing based full disk encryption
There are a number of free (TrueCrypt is the most famous) and paid software solutions to encrypt the entire disk, but recently, before he had many attacks of the maid of Evil, in a PCAlone in a hotel room on the left is booted from an external hard drive to steal your password. But Joanna Rutkowska described Labs invisible things like Microsoft's BitLocker encryption solution can be easily extended disk, so that the user can easily see that the computer has been hacked. If this attack is not bad cleaning of great concern, Trusted Computing Group has defined the opal implements the specification, the entire hard disk hardware encryption,Remember that every service software solutions. There is no good reason for the next unit to purchase, no support for the specific Opal.

Segundo Unified Secure connection to your favorite sites
The OpenID initiative has produced a way of letting in many places with a single password to access while maintaining a central location. This is an excellent initiative, but also for greater acceptance and adoption by organizations such as banks, have higher security requirements,and adoption by users the same safety requirements must be higher Wave Systems has taken another step in protecting your passwords with a built-platform of trust, so the server can be the other end to ensure that ' user is actually the word is guaranteed compatible with the identity of the TPM, and you can be sure that access to services can be achieved by the team with the TPM installed.

Third network security
This function is aGreat for a business, perhaps more by the administrator when the employee, but. CNC, Trusted Network Connect has identified a number of protocols on IF-MAP protocol interface to access metadata, subscribers to your state consultation, and other networking devices allowed them on the network of discussion. Although designed for corporate networks, is considered in the domestic sphere, for example, someone might be hacking into the network and toasterclose enough benefits for the end toaster roasts, the rest of your home.

Back to DRM
Oh, look, I told the ghost of text, send the Trusted Computing DRM opponents attack with indignation. However, the fact of the matter is that the media companies want to provide content through the network, but do not want to do what you want, what makes the money spent a lot of content. Trusted Computing and Trusted Platform ModuleIts network connected set-top box, and you have a system that has the potential to meet the "better than free," a mantra, as was done for iTunes Music.

Cell phone safety fifth
Currently, some mobile phones like the BlackBerry is an excellent security, as the assertion that the iPhone, and fewer still have little or nothing. However defined, the Trusted Computing Module Mobile confidence, security chip (or software mode of trust and implement safelysame function) adds that the same functions of the TPM, plus a few extras tailored to the music world. Now the mobile operator to your ringtones Rock-solid DRM (yes, the eyes may also comment on these things!) Yes, but more important is the mobile banking can be safe if not more, PC banking. The National Security Agency, the U.S. is said that in the present, looking for who knows what ...

So there are five good reasons Trustworthy Computing exciting.In some previous cases, can not be your friend, but "Trusted Computing" is certainly not your enemy unless of course you can be a pirate! People who work in trusted computing standards have talent and some children if one of them, even the guys I know Microsoft are around you and that fit their products. In fact, the TPM specification is tilted backwards for privacy at the expense of functionality!

Friday, April 9, 2010

Google Chrome OS - take chromium and Trusted Computing?


Image : http://www.flickr.com


For an exciting development that should come from the recent announcement of Google Chrome compatibility with computer operating system trusted by the Trusted Platform Module (TPM) chip in the basic specification is based on the news, but first a little later. There are two operating systems such as chromium and chromium OS OS both support TPM, and the two are essentially identical, reflecting similar Chromium and Google Chrome web browser. The version of Chrome is the Google brand,Chrome is open source to the public, but in theory the same code base. From here, I will use the familiar notion of Chrome, but the current version of browser and operating system chrome.

What operating system and TPM Chrome give us?
Trusted Computing and TPM has bad image of the Open Source fans, many fans like Google for MPR in the new operating system brings a bit 'of cognitive dissonance. Do not worry,However, Google no harm, and this philosophy is reflected in their approach. First, to support a TPM is only one option, but since Chrome is open source, any supplier of TPM required. Thus, if a TPM is currently the function described, the method proposed by the Trusted Computing Group to implement a load of confidence, a method that produces nothing more than a boot disk using trust records of confidence in the TPM.

This means that the customerApplications and remote servers, can testify to the status of the device and can tell if started in a known state of confidence. Although the point of view could raise his arms in horror at the exit of the third configuration of the TPM, and an operating system, is the advantage for banking applications, for example, where the Bank can verify the TPM Chrome conditions operation and, if it decides that an alien, potentially dangerous for the possibility ofspyware software on the device, deny access to your banking information.

What operating system and TPM Chrome does not give us?
A TPM system does not prevent piracy in order to receive approval for the Google-go, that people not only want to install your OS on the device, but also the firmware, methods are provided to allow the device is restarted under these conditions . Since the TPM is always a liability, there is no way to identify an unexpectedThe operating system or boot firmware and avoid allegations, despite what critics TPM.

In fact, if you can convince a bank that informed and know what they do, they can also provide a way for you to be registered in a state known good configuration of personal computer software system, as in the previous section, the Bank can attest to their staff, the wider the TPM, thus accepting device configuration itself, but the identification of anomaliespersonal settings.

But why a TPM-looking?
In most homes there are probably two different types of devices connected to the Internet. The first is the team, second home electronics such as televisions or game machines. the use of personal computers, TPMS are selling a bit 'heavy, but also for electronic devices at home, you want to just start and do not work, the interest of someone other than just Bog standard output using the dialogPlayStation. One device in Google's new operating system is based more in the second category, you (with you that the average user, not haxx0r leet) I just want this to work.

However, the Internet is a big bad world, and all surfing can expose all kinds of harmful content that can infect the device. With the addition of a TPM in the mix, users have additional assurance that the device is still in a safe and reliable. For example, after the launch of Chromedevice operating system can be TPM status and use this information to decode a message sent to investigate the connection, so if you saw a confused message that you can know the device may not be in the state, and measures for the problem.

Also services you can access the status of the TPM in the operating system, and if the state does not recognize, take measures to prevent illegal access or invalid.

Finally, since each TPM has a unique identityThe device is stolen, it can be put in place systems to blacklist certain devices. A device on the black list may be denied access to services, and (always in mind is not a function of the TPM, but by developers to add an operating system with a TPM), and then offered personally identifiable information to remove the disc or even in the TPM, or even more drastic, broke a switch, but it is not an option very tolerant!

Therefore, to build with TPMa device safe, reliable, easy to use actually works, such as televisions and VCRs, just work, so if Chrome OS-based Tablet, photo frame, laptop, or is that form factor seems to be sure to ask if the seller is a TPM inside the unit.