InvestorsHub Logo

Chance To See

09/28/09 9:15 PM

#182541 RE: Weby #182540

Weby, thanks for the response.

I corrected the terminology in my post from Trusted Network Connect to Trusted Execution Technology, but too late. But the point I was trying to make was that TXT does use the TPM, which was what wavedreamer asked. (Unless he meant Anti-theft Technology and used TXT in error.)

Also, I assume you added an extra word to this sentence: “Meanwhile there is little reason to think that Wave's role in TPM management has not been subsumed or worked around to any serious degree.”

This is the first I’ve heard about the TPM possibly ending up actually in the CPU…. Oh well, another thing to worry about.

awk

09/28/09 10:05 PM

#182542 RE: Weby #182540

Weby: TPM and iTPM and other TPMs

1. It does not matter where a TPM is located, whether it is a physical TPM, an iTPM or a virtualized TPM (vTPM)... or whatever other damned TPM, the TPM serves a the root-of-trust and MUST ALWAYS BE MANAGED. Period.

2. Before the TPM gets incorporated into the CPU... many years will yet pass. There are technical issues with flash memory... not so easy to incorporate into 30 and 45 nanometer technology....

3. There is no reason whatsoever to conclude "...that TPM management has been subsumed or worked around to any serious degree..." Just one reason...