TPM

From OSx86
(Difference between revisions)
Jump to: navigation, search
(Trusted Platform Module 101)
Line 1: Line 1:
<center>'''Posting information or discussion here related to cracking or circumventing will not be tolerated, and should be kept off-site.'''</center>
+
The United States Department of Justice has closed this public forum in response to its violation of copyright and DRM laws. Any contributors to this article will be contacted via their IP address to determine who is eligible for felony charges. This page is also in violation of the The Digital Millennium Copyright Act of 1998 for providing information on bypassing an Operating System and distributing this information to others.
  
== Trusted Platform Module 101 ==
+
Thank you for your understanding and cooperation,
 
+
Kevin L. Childress Department of Justice
'''What is the TPM?'''
+
 
+
The Trusted Computing Group (TCG) is an alliance of Microsoft, Intel, IBM, HP and AMD which promotes a standard for a ‘more secure’  (i.e. under their control) PC. Their definition of security is controversial; machines built according to their specification will be more trustworthy from the point of view of software vendors and the content industry, but will be less trustworthy from the point of view of their owners. In effect, the TCG specification will transfer the ultimate control of your PC from you to whoever wrote the software it happens to be running. (Yes, even more so than at present.) For another opinion, read IBM's [http://www.research.ibm.com/gsal/tcpa/tcpa_rebuttal.pdf TCPA Misinformation Rebuttal].
+
 
+
The TCG project is known by a number of names. `Trusted computing' was the original one, and is still used by IBM, while Microsoft calls it `trustworthy computing' and the Free Software Foundation calls it `treacherous computing'. Other names you may see include TCPA (TCG's name before it incorporated), Palladium (the old Microsoft name for the version due to ship in 2006) and NGSCB (the new Microsoft name). Intel has just started calling it `safer computing'. Many observers believe that this confusion is deliberate - the promoters want to deflect attention from what TC actually does. '''Discuss TPM in our [http://www.osx86project.org/forum/index.php?showforum=2 Forum]'''
+
 
+
While most users do not do their own programming, for many hackers who built the industry and old time programmers, this is the latest wave of &quot;bite the hand that fed you&quot; restrictions on programming one's own machine. For this group, the logical endpoint of being pushed off their own machines, which can only be centrally programmed,  is problematic.
+
 
+
'''More Information'''
+
 
+
*[http://www.againsttcpa.com/tcpa-faq-en.html General TPM FAQ]
+
 
+
*[http://www.webservicespipeline.com/development/22104133 Opinion polls on TPM]
+
 
+
*[http://developer.intel.com/design/mobile/platform/downloads/Trusted_Platform_Module_White_Paper.pdf Intel White Paper (PDF)]
+
 
+
*[https://www.trustedcomputinggroup.org/home Trusted Computing Group]
+
 
+
*[http://www.infineon.com/cgi/ecrm.dll/ecrm/scripts/prod_ov.jsp?oid=29049 Infineon TPM Homepage]
+
 
+
*[http://www.silicon-trust.com/trends/comp_tpm.asp About the Infineon TPM]        <DEAD LINK
+
 
+
'''Tools'''
+
 
+
*[http://www.research.ibm.com/gsal/tcpa/ IBM TPM Resources] Including tools for modifying the TPM under Linux
+
 
+
*[http://www.kernelthread.com/mac/apme/syscall/ Re-routing System Calls] (a potential method for intercepting TPM information)
+
'''Emulation'''
+
 
+
*[https://developer.berlios.de/projects/tpm-emulator A software based TPM emulator]
+
 
+
*[http://tpm-emulator.berlios.de/documentation.html Limitations of the emulator]
+
 
+
== Chip Information ==
+
 
+
Below is an image of the Infineon TPM from the Developers Transition Kit.
+
 
+
[http://img205.imageshack.us/my.php?image=tpm2nj.jpg http://img205.imageshack.us/img205/4603/tpm2nj.th.jpg]<br>
+
 
+
And a modified image which gives a full view of the chip:
+
 
+
[http://img46.imageshack.us/img46/9736/appletpmrotatesharpen4nw.jpg http://img46.imageshack.us/img46/9736/appletpmrotatesharpen4nw.jpg]
+
 
+
As you can see, this chip is clearly the [http://www.google.com/search?q=Infineon+SLD9630+TT1.1&sourceid=opera&num=0&ie=utf-8&oe=utf-8 Infineon SLD 9630 TT1.1] or simply [http://www.google.com/search?hl=en&lr=&safe=off&c2coff=1&q=SLD9630+TT1.1&btnG=Search SLD 9630 TT1.1], which, with a simple Google search on the chip, is a &quot;Trusted Platform Module IC&quot;, or TPM/TCPA IC (integrated circuit, aka computer chip). Infineon has a short PDF detailing the basics of its SLD 9630 chip, although it has been removed from the Infineon website. On an interesting note, the SLD 9630 is actually outdated and is no longer being advertised by Infineon. Its replacement is the SLB 9635, which is dubbed &quot;TPM 1.2&quot;, as opposed to the &quot;TPM 1.1&quot; found in the SLD 9630.
+

Revision as of 22:46, 25 February 2007

The United States Department of Justice has closed this public forum in response to its violation of copyright and DRM laws. Any contributors to this article will be contacted via their IP address to determine who is eligible for felony charges. This page is also in violation of the The Digital Millennium Copyright Act of 1998 for providing information on bypassing an Operating System and distributing this information to others.

Thank you for your understanding and cooperation, Kevin L. Childress Department of Justice

Powered by MediaWiki © 2021 OSx86 Project  |   InsanelyMac  |   Forum  |   OSx86 Wiki   |   Privacy policy   |   About OSx86   |   Disclaimers