Jump to content

Talk:Trusted Platform Module

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by BMJ-pdx (talk | contribs) at 15:19, 7 July 2023 ("Versatile" or "Volatile" Memory ?: new section). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Disabling TPM

As much as I love the NSA looking through email and phone records, I would prefer that the had to *at least* work for it. Trusted Computing (What a crock BTW) says it can be turned off, but does anyone know how? Fosnez 07:52, 13 February 2007 (UTC)[reply]

you can do that from the BIOS setup ro from the OS .. see also http://technet.microsoft.com/en-us/windowsvista/aa905092.aspx#BKMK_S2 Dbiagioli 08:31, 13 February 2007 (UTC)[reply]
link is broken--None Error (talk) 22:07, 9 September 2008 (UTC)[reply]
TPMs are turned off by default (cf. https://books.google.co.uk/books?id=xS0kBgAAQBAJ&pg=PA133&lpg=PA133&dq=TPMs+off+by+default+trusted+computing+-tire&source=bl&ots=tpmK78ti0Y&sig=t-smcA518TA-q3vaKFBC5KFF5Lo&hl=en&sa=X#v=onepage&q=TPMs%20off%20by%20default%20trusted%20computing%20-tire&f=false) — Preceding unsigned comment added by 194.213.3.4 (talk) 14:19, 23 February 2016 (UTC)[reply]

Yes, it is true that you can turn off or remove the TPM just as you can turn off or remove any other computer part. But, this is a red herring.

The real problem is that it's possible to make a service or product that you can only access if you have an activated TPM. In the future, if you disable your TPM you may lose the ability to exchange documents or email with your coworkers, buy music online, or do any number of important things that require your computer to communicate with other computers. This will force you to keep your TPM enabled all the time in order to get stuff done. If you have to keep your TPM enabled all the time, then you get all the bad effects of Trusted Computing like government/commercial spying and other people controlling your computer.

The only defense is for most people to not buy or to disable their TPMs. That way, nobody will create services that only work with computers that have activated TPMs in the first place. —Preceding unsigned comment added by 75.111.42.52 (talk) 09:21, 26 November 2007 (UTC)[reply]

They're doing that at the ISP level; if they need to get something only on your computer, they're using back-doors in the firmware of the low-power Intel Quark / ARC4 CPU (on Intel) or the ARM core (AMD) running at higher privilege than system management mode (and required to boot the x86 processor). If these aren't directly available, I'm sure they've got exploits in the firmware of every major network interface device. Both of these are usually powered on even if the computer isn't. Basically the TPM has nothing to do with this, but if you actually get them looking at *your* computer you are screwed with no recourse unless you're running a fully open source hardware platform like POWER9, an operating system with as few security issues as possible (probably a BSD, I'd avoid a GUI, no third party software). Or just don't use the internet. It is IS an option. A Shortfall Of Gravitas (talk) 05:48, 13 November 2022 (UTC)[reply]
Not sure if you're aware, but you just responded to a fifteen year old comment. At any rate, I'm not clear in what way this is geared towards article improvement. Please see WP:NOTAFORUM. cheers. anastrophe, an editor he is. 07:58, 13 November 2022 (UTC)[reply]

Reorganize the availability section

I'd like to reorganize the availability section, which is titled TPM is implemented by several vendors: into sections on the TPM itself, platforms, software support, virtualization.

Is that OK? — Preceding unsigned comment added by Kgold1 (talkcontribs) 17:55, 2021 June 17 (UTC)

Restriction law section

The restriction law section states that Chinese and Russian laws restrict TPM access and then link to an article that speculates the reason that Windows 11 has optional flags to remove the TPM requirement is due to these laws.

However, the following press release shows that China and Russia both approved of TPM 2.0 -- https://trustedcomputinggroup.org/trusted-computing-group-tpm-2-0-library-specification-approved-isoiec-international-standard-date-published-june-29-2015/

I can also confirm that desktops that have been purchased in China have TPMs in them. — Preceding unsigned comment added by 59.148.176.172 (talk) 08:04, 2021 July 21 (UTC)

Needs reference for edit on Chinese algorithms.

A recent edit says (in the past). This needs a citation. — Preceding unsigned comment added by Kgold1 (talkcontribs) 21:11, 2021 August 13 (UTC)

Citation 1 on DRM

Currently Citation #1 references an article that uses a concept "technical protection measures" (TPM) that isn't even related to "trusted platform module" (TPM) and is a completely invalid citation. — Preceding unsigned comment added by 2604:4080:104A:0:CC7D:DE68:3970:7E0B (talk) 18:07, 25 August 2022 (UTC)[reply]

Good catch. Removed. Thanks. –Novem Linguae (talk) 23:02, 25 August 2022 (UTC)[reply]

Please update Richard Stallman's reaction to TPM

The final thought in the reception section is no longer accurate. I had to check citation 63 because I was surprised to read that. Indeed, he did state that TPM is harmless in 2015. But then an update in 2022 states, "As of 2022, the TPM2, a new 'Trusted Platform Module', really does support remote attestation and DRM. The threat I warned about in 2002 has become terrifyingly real." 135.245.48.87 (talk) 11:15, 3 May 2023 (UTC)[reply]

"Versatile" or "Volatile" Memory ?

In the image at the top labeled "Components of a Trusted Platform Module", shouldn't "Versatile Memory" be "Volatile Memory", the latter being contradistinct from "Persistent Memory" just above. BMJ-pdx (talk) 15:19, 7 July 2023 (UTC)[reply]