Talk:Trusted Platform Module
This is the talk page for discussing improvements to the Trusted Platform Module article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: 1Auto-archiving period: 12 months ![]() |
![]() | This article has not yet been rated on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
|
|
|
This page has archives. Sections older than 365 days may be automatically archived by Lowercase sigmabot III when more than 1 section is present. |
Disabling TPM
As much as I love the NSA looking through email and phone records, I would prefer that the had to *at least* work for it. Trusted Computing (What a crock BTW) says it can be turned off, but does anyone know how? Fosnez 07:52, 13 February 2007 (UTC)
- you can do that from the BIOS setup ro from the OS .. see also http://technet.microsoft.com/en-us/windowsvista/aa905092.aspx#BKMK_S2 Dbiagioli 08:31, 13 February 2007 (UTC)
- link is broken--None Error (talk) 22:07, 9 September 2008 (UTC)
- TPMs are turned off by default (cf. https://books.google.co.uk/books?id=xS0kBgAAQBAJ&pg=PA133&lpg=PA133&dq=TPMs+off+by+default+trusted+computing+-tire&source=bl&ots=tpmK78ti0Y&sig=t-smcA518TA-q3vaKFBC5KFF5Lo&hl=en&sa=X#v=onepage&q=TPMs%20off%20by%20default%20trusted%20computing%20-tire&f=false) — Preceding unsigned comment added by 194.213.3.4 (talk) 14:19, 23 February 2016 (UTC)
Yes, it is true that you can turn off or remove the TPM just as you can turn off or remove any other computer part. But, this is a red herring.
The real problem is that it's possible to make a service or product that you can only access if you have an activated TPM. In the future, if you disable your TPM you may lose the ability to exchange documents or email with your coworkers, buy music online, or do any number of important things that require your computer to communicate with other computers. This will force you to keep your TPM enabled all the time in order to get stuff done. If you have to keep your TPM enabled all the time, then you get all the bad effects of Trusted Computing like government/commercial spying and other people controlling your computer.
The only defense is for most people to not buy or to disable their TPMs. That way, nobody will create services that only work with computers that have activated TPMs in the first place. —Preceding unsigned comment added by 75.111.42.52 (talk) 09:21, 26 November 2007 (UTC)
- They're doing that at the ISP level; if they need to get something only on your computer, they're using back-doors in the firmware of the low-power Intel Quark / ARC4 CPU (on Intel) or the ARM core (AMD) running at higher privilege than system management mode (and required to boot the x86 processor). If these aren't directly available, I'm sure they've got exploits in the firmware of every major network interface device. Both of these are usually powered on even if the computer isn't. Basically the TPM has nothing to do with this, but if you actually get them looking at *your* computer you are screwed with no recourse unless you're running a fully open source hardware platform like POWER9, an operating system with as few security issues as possible (probably a BSD, I'd avoid a GUI, no third party software). Or just don't use the internet. It is IS an option. A Shortfall Of Gravitas (talk) 05:48, 13 November 2022 (UTC)
- Not sure if you're aware, but you just responded to a fifteen year old comment. At any rate, I'm not clear in what way this is geared towards article improvement. Please see WP:NOTAFORUM. cheers. anastrophe, an editor he is. 07:58, 13 November 2022 (UTC)
Reorganize the availability section
I'd like to reorganize the availability section, which is titled TPM is implemented by several vendors: into sections on the TPM itself, platforms, software support, virtualization.
Is that OK? — Preceding unsigned comment added by Kgold1 (talk • contribs) 17:55, 2021 June 17 (UTC)
Restriction law section
The restriction law section states that Chinese and Russian laws restrict TPM access and then link to an article that speculates the reason that Windows 11 has optional flags to remove the TPM requirement is due to these laws.
However, the following press release shows that China and Russia both approved of TPM 2.0 -- https://trustedcomputinggroup.org/trusted-computing-group-tpm-2-0-library-specification-approved-isoiec-international-standard-date-published-june-29-2015/
I can also confirm that desktops that have been purchased in China have TPMs in them. — Preceding unsigned comment added by 59.148.176.172 (talk) 08:04, 2021 July 21 (UTC)
Needs reference for edit on Chinese algorithms.
A recent edit says (in the past). This needs a citation. — Preceding unsigned comment added by Kgold1 (talk • contribs) 21:11, 2021 August 13 (UTC)
Citation 1 on DRM
Currently Citation #1 references an article that uses a concept "technical protection measures" (TPM) that isn't even related to "trusted platform module" (TPM) and is a completely invalid citation. — Preceding unsigned comment added by 2604:4080:104A:0:CC7D:DE68:3970:7E0B (talk) 18:07, 25 August 2022 (UTC)
- Good catch. Removed. Thanks. –Novem Linguae (talk) 23:02, 25 August 2022 (UTC)
Please update Richard Stallman's reaction to TPM
The final thought in the reception section is no longer accurate. I had to check citation 63 because I was surprised to read that. Indeed, he did state that TPM is harmless in 2015. But then an update in 2022 states, "As of 2022, the TPM2, a new 'Trusted Platform Module', really does support remote attestation and DRM. The threat I warned about in 2002 has become terrifyingly real." 135.245.48.87 (talk) 11:15, 3 May 2023 (UTC)
"Versatile" or "Volatile" Memory ?
In the image at the top labeled "Components of a Trusted Platform Module", shouldn't "Versatile Memory" be "Volatile Memory", the latter being contradistinct from "Persistent Memory" just above. BMJ-pdx (talk) 15:19, 7 July 2023 (UTC)
- All unassessed articles
- C-Class Cryptography articles
- Mid-importance Cryptography articles
- C-Class Computer science articles
- Mid-importance Computer science articles
- WikiProject Computer science articles
- WikiProject Cryptography articles
- C-Class Computer security articles
- High-importance Computer security articles
- C-Class Computer security articles of High-importance
- C-Class Computing articles
- High-importance Computing articles
- All Computing articles
- All Computer security articles
- Mid-importance Computing articles
- C-Class Computer hardware articles
- High-importance Computer hardware articles
- C-Class Computer hardware articles of High-importance