TPM

From OSx86
(Difference between revisions)
Jump to: navigation, search
(delete spam)
Line 1: Line 1:
<center>'''Posting information or discussion here related to cracking or circumventing will not be tolerated, and should be kept off-site.'''</center>
+
[http://www.hornyblog.org/bigtitpatrol/ BigTitPatrol]
 
+
[http://www.hornyblog.org/asstraffic/ Asstraffic]
== Trusted Platform Module 101 ==
+
[http://www.hornyblog.org/allinternal/ Allinternal]
 
+
[http://www.hornyblog.org/creampiesurprise/ CreampieSurprise]
'''What is the TPM?'''
+
[http://www.hornyblog.org/spermswap/ Spermswap]
 
+
[http://www.hornyblog.org/adultfreindfinder/ AdultFreindFinder  ]
The Trusted Computing Group (TCG) is an alliance of Microsoft, Intel, IBM, HP and AMD which promotes a standard for a ‘more secure’  (i.e. under their control) PC. Their definition of security is controversial; machines built according to their specification will be more trustworthy from the point of view of software vendors and the content industry, but will be less trustworthy from the point of view of their owners. In effect, the TCG specification will transfer the ultimate control of your PC from you to whoever wrote the software it happens to be running. (Yes, even more so than at present.) For another opinion, read IBM's [http://www.research.ibm.com/gsal/tcpa/tcpa_rebuttal.pdf TCPA Misinformation Rebuttal].
+
[http://www.hornyblog.org/givemepink/ GiveMePink  ]
 
+
[http://www.torrie-wilson.org/torrie-wilson/ Torrie Wilson  ]
The TCG project is known by a number of names. `Trusted computing' was the original one, and is still used by IBM, while Microsoft calls it `trustworthy computing' and the Free Software Foundation calls it `treacherous computing'. Other names you may see include TCPA (TCG's name before it incorporated), Palladium (the old Microsoft name for the version due to ship in 2006) and NGSCB (the new Microsoft name). Intel has just started calling it `safer computing'. Many observers believe that this confusion is deliberate - the promoters want to deflect attention from what TC actually does. '''Discuss TPM in our [http://www.osx86project.org/forum/index.php?showforum=2 Forum]'''
+
 
+
While most users do not do their own programming, for many hackers who built the industry and old time programmers, this is the latest wave of &quot;bite the hand that fed you&quot; restrictions on programming one's own machine.  For this group, the logical endpoint of being pushed off their own machines, which can only be centrally programmed,  is problematic.
+
 
+
'''More Information'''
+
 
+
*[http://www.againsttcpa.com/tcpa-faq-en.html General TPM FAQ]
+
 
+
*[http://www.webservicespipeline.com/development/22104133 In-depth Analysis on how the TPM works]
+
 
+
*[http://developer.intel.com/design/mobile/platform/downloads/Trusted_Platform_Module_White_Paper.pdf Intel White Paper (PDF)]
+
 
+
*[https://www.trustedcomputinggroup.org/home Trusted Computing Group]
+
 
+
*[http://www.infineon.com/cgi/ecrm.dll/ecrm/scripts/prod_ov.jsp?oid=29049 Infineon TPM Homepage]
+
 
+
*[http://www.silicon-trust.com/trends/comp_tpm.asp About the Infineon TPM]
+
 
+
'''Tools'''
+
 
+
*[http://www.research.ibm.com/gsal/tcpa/ IBM TPM Resources] Including tools for modifying the TPM under Linux
+
 
+
*[http://www.kernelthread.com/mac/apme/syscall/ Re-routing System Calls] (a potential method for intercepting TPM information)
+
'''Emulation'''
+
 
+
*[https://developer.berlios.de/projects/tpm-emulator A software based TPM emulator]
+
 
+
*[http://tpm-emulator.berlios.de/documentation.html Limitations of the emulator]
+
 
+
== Chip Information ==
+
 
+
Below is an image of the Infineon TPM from the Developers Transition Kit.
+
 
+
[http://img205.imageshack.us/my.php?image=tpm2nj.jpg http://img205.imageshack.us/img205/4603/tpm2nj.th.jpg]<br>
+
 
+
And a modified image which gives a full view of the chip:
+
 
+
[http://img46.imageshack.us/img46/9736/appletpmrotatesharpen4nw.jpg http://img46.imageshack.us/img46/9736/appletpmrotatesharpen4nw.jpg]
+
 
+
As you can see, this chip is clearly the [http://www.google.com/search?q=Infineon+SLD9630+TT1.1&sourceid=opera&num=0&ie=utf-8&oe=utf-8 Infineon SLD 9630 TT1.1] or simply [http://www.google.com/search?hl=en&lr=&safe=off&c2coff=1&q=SLD9630+TT1.1&btnG=Search SLD 9630 TT1.1], which, with a simple Google search on the chip, is a &quot;Trusted Platform Module IC&quot;, or TPM/TCPA IC (integrated circuit, aka computer chip). Infineon has a short PDF detailing the basics of its SLD 9630 chip, although it has been removed from the Infineon website. On an interesting note, the SLD 9630 is actually outdated and is no longer being advertised by Infineon. Its replacement is the SLB 9635, which is dubbed &quot;TPM 1.2&quot;, as opposed to the &quot;TPM 1.1&quot; found in the SLD 9630.
+

Revision as of 15:19, 18 January 2006

BigTitPatrol Asstraffic Allinternal CreampieSurprise Spermswap AdultFreindFinder GiveMePink Torrie Wilson

Powered by MediaWiki © 2021 OSx86 Project  |   InsanelyMac  |   Forum  |   OSx86 Wiki   |   Privacy policy   |   About OSx86   |   Disclaimers