There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

Dark_Arc , (edited )
@Dark_Arc@social.packetloss.gg avatar

That’s pretty terrible argumentation. All DRM measures are just “a piece of hardware” in the end, yet I’m forced by Microsoft to install a TPM2 module to use their latest software. How long until I no longer have the choice not to use it, even on a free OS?

Your tinfoil hat is showing…

And since I can’t change those keys and can’t look into the module, it can literally be used for oppression.

IIRC you can store new keys in the TPM, they’re just not going to be signed by the manufacturer.

Great example. Now imagine a centralized block list by the government for all major web services, for which the infrastructure is literally there now.

That wouldn’t work… and isn’t how that works… That would require browser vendors to actually implement some kind of “here’s my TPM” handshake and websites to care enough to refuse service if you fail that validation.

If someone wanted to do that, they could do that already without a TPM. Error: “You must have a valid license from Microsoft or Apple DRM to use the internet.”

The reason it could work for games is they could tie their game anticheat into the TPM … and that’s something that has to happen as an agreement between vendors for specific games, anti-cheats, or stores. This could (and I am talking out of my ass a bit here as I don’t know the full details of how TPM boot validation works – though TPM passthrough, like GPU passthrough is a thing in QEMU) potentially open the door for VMs that can play games as well if someone wanted to invest the time, as in theory the TPM could validate the Windows 11 VM boot hasn’t been tampered with.

Also, a TPM is not DRM, it’s a cryptography coprocessor with verifiably secured keys… that’s just a unique hardware function that’s desirable (particularly for certain corporate environments, militaries, etc), that want to verify their devices haven’t been hacked) can’t be done any other way.

Fearing a TPM is like the folks foreshadowing that secure boot was going to be the end of Linux; it wasn’t and it isn’t. That’s true of this particular piece of hardware as well (and, it can be used for other things).

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines