CSMatt Posted August 30, 2006 Share Posted August 30, 2006 Something that has been concerning me for quite some time is the Trusted Computing initiative. Namely, Trusted Computing's ability to give authoritarian control to a developer should they decide to use it. Well, eventually every digital gadget in existence will have implemented Trusted Computing, and it concerns me that all of the dangers foretold by various Trusted Computing opponents will become a reality. Do you think that developers will ultimately use the technology of the Trusted Computing to do such disastrous things, or is this just a big hypothetical scare that will most likely have little or no "de facto" changes in the freedoms of computer use? Link to comment Share on other sites More sharing options...
Superhai Posted August 30, 2006 Share Posted August 30, 2006 I think the chance that a developer will do it is as big as the chance are someone will steal his works... Link to comment Share on other sites More sharing options...
CSMatt Posted August 31, 2006 Author Share Posted August 31, 2006 In other words, "extremely likely"? Link to comment Share on other sites More sharing options...
Superhai Posted August 31, 2006 Share Posted August 31, 2006 I haven't read enough about how big control the TPM will have in a computer, but if you see a list of virus defines a average antivirus software has to deal with, you get the clue what people will do. Link to comment Share on other sites More sharing options...
CSMatt Posted September 1, 2006 Author Share Posted September 1, 2006 You might want to read this then to see where I'm coming from. Link to comment Share on other sites More sharing options...
SemjaZa Posted September 11, 2006 Share Posted September 11, 2006 Hi guys, its been quite a while since my decrypts were released, and I got a lil story for u. It started of by me instructing a person with an intel mac line by line what to type in gdb to load the encrypted binaries into memory and set a breakpoint before it starts running the first instruction of the program, enabling us to save the decrypted binary after run. Id have to thank the involved person for doing the amd part by himself. This gradually got tiring, due to lots of ppl mailing me, complaining about that they didnt work etc.. which is a load of {censored}. ppl do nag a lot and some are pretty unserious which is one of the reasons that maxxuss went underground. So, I hacked together some source for a certain kext with the name of a character in starwars and released that under my real nick which you may find if you do tail -f /var/log/system.log aRt.thou.an.aLien The above reminds me of a certain virtual host... Apparently this release made a lot of people angry and it got me in trouble and Im really struggling on irc these days, even lost my operator status, was degraded to hop and then to nothing - which is understandable though op is not much of a status really as I never needed it - unless kicking a friend All I have to say is, Im sorry for the release of a certain kext + source and the problems I caused, and it wont happen again. So, to avoid such problems as an innocent being pinned by apple to take the blame, Im admitting my identity: aRt out... Link to comment Share on other sites More sharing options...
paulicat Posted September 11, 2006 Share Posted September 11, 2006 I personally don't think you needed to explain this Semjaza/aRt. But I for one welcome my certain star wars character named kext overlord!! Cheers! Link to comment Share on other sites More sharing options...
Recommended Posts