Trusted Platform Module: Difference between revisions

Content deleted Content added
mNo edit summary
linus torvalds: there is no point in supporting randomness from firmware source.
Line 18:
 
One of [[Windows 11]]'s operating system requirements is TPM 2.0 implementation. Microsoft has stated that this is to help increase security against firmware attacks.<ref>{{Cite web |last=Warren |first=Tom |date=2021-06-25 |title=Why Windows 11 is forcing everyone to use TPM chips |url=https://www.theverge.com/2021/6/25/22550376/microsoft-windows-11-tpm-chips-requirement-security |access-date=2021-11-13 |publisher=The Verge |language=en}}</ref>
 
The bloat of functions was critizised, especially random number generation<ref>{{Cite web |last=Neowin · |first=Sayan Sen |date=2024-10-23 |title=Linus Torvalds seems frustrated with AMD Ryzen fTPM bugs and issues, suggests disabling |url=https://www.neowin.net/news/linus-torvalds-seems-frustrated-with-amd-ryzen-ftpm-bugs-and-issues-suggests-disabling/ |access-date=2024-10-23 |website=Neowin |language=en}}</ref>.
 
== History ==
Line 45 ⟶ 47:
 
=== Platform integrity ===
The primary scope of TPM is to ensure the [[data integrity|integrity]] of a platform during boot time. In this context, "integrity" means "behaves as intended", and a "platform" is any computer device regardless of its [[operating system]]. This is to ensure that the [[boot process]] starts from a trusted combination of hardware and software, and continues until the operating system has fully booted and [[Application software|applications]] are running.
 
When TPM is used, the firmware and the operating system are responsible for ensuring integrity.
Line 160 ⟶ 162:
 
In 2015 [[Richard Stallman]] suggested to replace the term "Trusted computing" with the term "Treacherous computing" due to the danger that the computer can be made to systematically disobey its owner if the cryptographical keys are kept secret from them. He also considers that TPMs available for PCs in 2015 are not currently{{clarify timeframe|date=December 2022}} dangerous and that there is no reason '''not''' to include one in a computer or support it in software due to failed attempts from the industry to use that technology for [[Digital rights management|DRM]], but that the TPM2 released in 2022 is precisely the "[[Trusted Computing|treacherous computing]]" threat he had warned of.<ref>{{Cite web|title=Can You Trust Your Computer? - GNU Project - Free Software Foundation|url=https://www.gnu.org/philosophy/can-you-trust.en.html|access-date=2023-09-06|website=www.gnu.org}}</ref>
 
Linux Torvalds in 2023 wrote that there is no way to believe that randomness generated by TPM is any better than randomness generated anyway by the CPU, and there is no point in supporting randomnes from a firmware source.<ref>{{Cite web |last=Neowin · |first=Sayan Sen |date=2024-10-23 |title=Linus Torvalds seems frustrated with AMD Ryzen fTPM bugs and issues, suggests disabling |url=https://www.neowin.net/news/linus-torvalds-seems-frustrated-with-amd-ryzen-ftpm-bugs-and-issues-suggests-disabling/ |access-date=2024-10-23 |website=Neowin |language=en}}</ref>
 
== Attacks ==