Language: English
2023-07-29, 10:45–11:15 (Asia/Taipei), TR 412-2
TPM2 is not about making the computer more trustworthy to you. It is about forcing you, the user, to earn the trust of big corps by tethering your identity to the unique ID of the computer whenever you use a cloud service. The "fairness" of DRM, game anti-cheating, and exam proctoring will be more easily enforced if the big corps have rootkit-like control over everyone's computer. Reverse engineering tools such as virtual machine will not help the user regain total control of his own computer.
There is an open source implementation of TPM2 software stack. Enabling GNU/linux to run TPM2 is some achievement, but it does not address the issue of the (effectively) real-name future of the Internet likely envisioned by TPM2 designers. Most likely it only allows GNU/linux users to be identified as such and very likely to be discriminated against because, unlike MS windows users, the GNU/linux users will enjoy "too much" freedom for the cloud service providers to enforce rootkit-like restrictions. The TPM2 hardware (which dominates the PC market) may or may not be open source friendly, depending on how you define it, but it certainly is not freedom friendly. It revolves around the fact that the hardware owner does not have the freedom to read his/her own private key. It may have been "inspired" by the failure of old-time DRM to restrict the freedom of open source users. The speaker hopes that the general public will be motivated to think about the "freedom" aspect of the open source software and hardware, not just the "open source" aspect.
中階
Target Audience –People who care about computer sovereignty. Basic knowledge about asymmetric encryption will greatly help understanding this talk.
Length of session –45 分鐘