Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Microsoft Operating Systems Software

Windows Security GM Talks NGSCB (Palladium) 281

An article at IT Manager's Journal (along with Slashdot, part of OSDN) reports on John Manferdelli's recent talk at Stanford on what Microsoft is calling for now its "Next Generation Secure Computing Base," or NGSCB (formerly Palladium). Manferdelli is the general manager for Windows security at Microsoft, and his presentation was mostly about the technical, not ethical or other considerations involved in this system. His position is understandably different from those of privacy and free software advocates who assert that Microsoft's elaborate security is designed to lock users into Microsoft software at the expense of privacy and choice.
This discussion has been archived. No new comments can be posted.

Windows Security GM Talks NGSCB (Palladium)

Comments Filter:
  • What it's about: (Score:5, Insightful)

    by iantri ( 687643 ) <iantri&gmx,net> on Wednesday December 03, 2003 @12:24PM (#7618982) Homepage
    "Trusted Computing" basically means "you TRUST us, we don't trust you."

    A great victory for consumers everywhere.

    • by hanssprudel ( 323035 ) on Wednesday December 03, 2003 @12:28PM (#7619019)
      More accurately it means:

      "People who don't trust you can trust your computer to control you."
      • Re:What it's about: (Score:5, Interesting)

        by Zeinfeld ( 263942 ) on Wednesday December 03, 2003 @01:16PM (#7619486) Homepage
        More accurately it means: "People who don't trust you can trust your computer to control you."

        Actually it means that people who do not trust your computer configuration can pass data to you and be confident at some level that it is not exposed.

        Palladium is no better for DRM copyright enforcement applications than any other hardware technology. The problem with DRM is that it is break once run anywhere. Palladium like any other hardware enforcement system is breakable, the catch is that you have to break a system that is trusted by the sender of the data.

        For copyright control you cannot be any more selective about the destination machine than requiring it to be a palladium machine. So it only taks one palladium machine ever to be broken and you are toast.

        For control of sensitive company documents the issue is very different. I can configure my systems so that they only deliver sensitive data to specific palladium pcs that I have designated as trusted and to obtain my documents you have to break those specific machines.

        There are still people who complain about this sort of thing. Where would the world be without corporate whistleblowers? Pretty much where we are today, there were no shortage of whistleblowers on Enron, Krugman reported repeatedly in the New York Times, few took notice until Enron collapsed and suddenly it was open season, everyone acknowledged that Enron and co had ben ripping off California...

        Security is security, you can't expect technology to enforce your particular set of ethical constraints. Palladium turns out to be very useful for meeting a real business need which in most cases is completely legitimate. I do not want communications with my lawyers to be disclosed. Confidentiality is in general a good thing, it is occasionally a bad thing.

        But one thing to consider is that the greater the confidence that people have that their communications are secret the greater the probability they will say something in a permenant form that later compromises them. Nixon discovered this. I don't think that security will prevent disclosure of information about criminal activities and frauds.

        Take Diebold for example, if they were cluefull enough to have used DRM to control their internal documents they might have been cluefull enough to secure their Web site to stop an attacker from compromiseing their software to rig the vote. What we need in the Diebold case is not internal company memos with incriminating information. What we need is a reliable security audit.

        • by DickBreath ( 207180 ) on Wednesday December 03, 2003 @01:37PM (#7619722) Homepage
          Actually it means that people who do not trust your computer configuration can pass data to you and be confident at some level that it is not exposed.

          That is one element of what it is about.

          If they can trust the programs on your computer to do what they want, then those programs can also be trusted to control your behavior and actions.


          Palladium turns out to be very useful for meeting a real business need which in most cases is completely legitimate. I do not want communications with my lawyers to be disclosed. Confidentiality is in general a good thing, it is occasionally a bad thing.

          There is this thing called cryptography that meets the business need you speak of.

          The "business need" that Palladium meets is the need to control users behavior, what software they can run, and perhaps most importantly, what software they can NOT run.


          But one thing to consider is that the greater the confidence that people have that their communications are secret the greater the probability they will say something in a permenant form that later compromises them.

          If you can't stand up for what you say, then don't say it. And please do not run for public office. Let your "yes" mean yes and your "no" mean no. Say what you mean and mean what you say.

          Yeah, wonderful thing here. The ability to say something, and then later take it back, knowing that one can trust other users computers to obey.


          Where would the world be without corporate whistleblowers?

          This is an interesting issue. What whistleblowers are about is someone who is involved or exposed on some level to wrongdoing and then decides to blow the whistle. Palladium will never stop this. Whistleblowing is about one of a bunch of thieves developing a momentary feeling of guilt. I am not aware of any whistleblowers who obtained their information by snooping in information they were not supposed to have access to. Palladium won't stop whistleblowers. It will just stop you from doing things with your computer that Microsoft does not like.
          • There is this thing called cryptography that meets the business need you speak of.

            Wrong - cryptography doesn't keep your employees from forwarding your internal memos to whoever they want. Granted DRM doesn't keep someone from just retyping something, but it definitely raises the bar to casual copying.

            If you can't stand up for what you say, then don't say it. And please do not run for public office. Let your "yes" mean yes and your "no" mean no. Say what you mean and mean what you say.

            What a silly se
        • Re:What it's about: (Score:5, Interesting)

          by Hobbex ( 41473 ) on Wednesday December 03, 2003 @01:58PM (#7619930)
          Actually it means that people who do not trust your computer configuration can pass data to you and be confident at some level that it is not exposed.

          TO YOU. That it is not exposed _to you_.

          Why do the MS apologists always leave out those little important words that make all the difference!
        • Re:What it's about: (Score:2, Interesting)

          by fermion ( 181285 )
          The problem with DRM is that it is break once run anywhere. Palladium like any other hardware enforcement system is breakable, the catch is that you have to break a system that is trusted by the sender of the data.

          For control of sensitive company documents the issue is very different. I can configure my systems so that they only deliver sensitive data to specific palladium pcs that I have designated as trusted and to obtain my documents you have to break those specific machines.

          Really, the internal p

    • Re:What it's about: (Score:5, Informative)

      by Anonymous Coward on Wednesday December 03, 2003 @12:29PM (#7619036)
      Fixed link to the article - is here [itmanagersjournal.com]
      • by hummer357 ( 545850 ) on Wednesday December 03, 2003 @02:41PM (#7620343)
        Will we keep our right of private ownership of computers?
        Will we keep our right of free use of our Net?

        ehm... i think it's grotesque that someone would even think of asking these questions.

        i also think that the whole 'Next Generation Secure Computing Base' thing is about who will be pimping who.

        some time before we'll get the final version of longhorn stuffed down our throats, msft will probably have decided that it's in everyone's (*) interest to expand the trusted compiting base to the full operating system, and we'll be able to forget about using any software that wasn't okay'ed by msft to run on the system. (= signed code?)

        maybe we'll see modchips for regular computers in the future too?

        better start stroking the penguin sooner than later!

        h357 - paranoia est. 1977

        (*) everyone = riaa/mpaa members, msft themselves, anyone who pays premium prices to develop software using msft tool
    • by IthnkImParanoid ( 410494 ) on Wednesday December 03, 2003 @12:31PM (#7619046)
      More like: If you work with us*, we'll trust you.



      *"Working with us" is defined as not competing with any of our products and offering appropriate compensation by not working with our competitors and agreeing to only develop only for our latest products, helping us enforce the upgrade cycle.
    • by garcia ( 6573 ) * on Wednesday December 03, 2003 @12:37PM (#7619125)
      yup. and it means that they are going to do everything in their power to stop us from having any freedom. That includes forcing us to use a BIOS that will only "trust" their OS and thus render most hardware useless except for Windows.

      See more here [slashdot.org].

      (Please note that this comment mentions that we have to trust them and they don't trust us.)
    • by Anonymous Coward
      Who should your computer take its orders from? Most people think their computers should obey them, not obey someone else. With a plan they call "trusted computing," large media corporations (including the movie companies and record companies), together with computer companies such as Microsoft and Intel, are planning to make your computer obey them instead of you. Proprietary programs have included malicious features before, but this plan would make it universal.

      Proprietary software means, fundamentally, t
      • Re:What it's about: (Score:5, Informative)

        by dspeyer ( 531333 ) <dspeyer&wam,umd,edu> on Wednesday December 03, 2003 @01:29PM (#7619645) Homepage Journal
        You left out:
        Copyright (C) 2002 Richard Stallman.

        Verbatim copying and distribution of this entire article is permitted without royalty in any medium provided this notice is preserved.

        When you're copying an entire essay, is it really too much to include a few lines at the end, so that people know who wrote it and what they're allowed to do with it? It's not like you have to copy-type it, we have copy-and-paste working reliably now? :-)

        Incidentally, the original article included a few footnotes, and is available on GNU's site [gnu.org].

      • Who should your computer take its orders from?

        Hint: it isn't the millions of idiots who click 'yes' when that annoying Gator applet pops up. Trusted Computing will be the best thing since sliced bread for 99.999 percent of the computer-using population.

        If the open-source community wants to sit and watch DRM and Trusted Computing take the industry by storm, at least they should try and develop an alternate solution to the problem. A keystroke logger is easily embedded in a midget bowling application tha
        • If the open-source community wants to sit and watch DRM and Trusted Computing take the industry by storm, at least they should try and develop an alternate solution to the problem. A keystroke logger is easily embedded in a midget bowling application that will be run by 99.999 percent of the recipients. And most of those people are at work when they do it...

          There's no duplicate in the free software world for the actual motives behind Trusted Computing(tm), and therefore no need to duplicate the technology.

    • by Alphanos ( 596595 ) on Wednesday December 03, 2003 @12:58PM (#7619338)
      Isn't it more like "you MUST 'trust' us or you cannot access the internet"? That's the eventual goal, anyway.
    • Hmm.. For some odd reason Vaporware comes to mind :)

      I am sure if they are truely working on a secure os.. all of the features will not be added into thier next OS... It will surely span 2-3 OS releases :)
      • So I wonder, when is Apple going to teach their sales drones, that "You're still allowed to download MP3s with this" is something that will count as an advantage of their computers. Well, those who market Linux PCs should be doing this as well, but unfortunately there aren't any major distributors with Linux PCs in computer stores (Wal-Mart isn't a computer store)
    • From http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html which has a lot on background on TC / TCG / LaGrande / NGSCB / Longhorn / Palladium / TCPA / whatever they are calling it next week:

      "In the US Department of Defense, a `trusted system or component' is defined as `one which can break the security policy'. This might seem counter-intuitive at first, but just stop to think about it."
    • by ScottGant ( 642590 ) <scott_gant@sbcgloba l . n etNOT> on Wednesday December 03, 2003 @02:01PM (#7619960) Homepage
      I'm on the Gentoo IRC channel a lot, getting help and giving help when I can. But when I try to bring up the pitfalls of trusted computing, all I get is a 'huh'? or "nah, it will be ok I'm sure".

      It's like everyone has their heads in the sand. When the major BIOS makers are going to trusted only computing, where are we going to run our Linux?

      Some people say "just buy a Mac". I'm sorry, if I could afford a Mac I would. But since I can't build a brand new Mac for $475 like I did the machine I'm using now, it's going to be a while. And the only reason I built this so cheaply is because I didn't have to pay a Microsoft tax.

      I want a machine I can build myself. An OS that I build myself. When I do that, I'M THE ONE WITH CONTROL! Not MS or Dell or Gateway or Pheonix.
    • Trust is important, and ultimately trust in the computer world will come down to biometrics, just as it will in the world of finance. When you act untrustworthy and fail to pay your debts, or if you pirate software, you will be widely considered to have broken an important social contract, and systems will exist so that others will be aware of your past history before allowing you to take advantage again.

      Similar to today, where some less risk-averse lenders will loan those with poor credit history money a
  • Security? (Score:5, Funny)

    by Mr_Silver ( 213637 ) on Wednesday December 03, 2003 @12:26PM (#7618993)
    Manferdelli is the general manager for Windows security at Microsoft

    Rumour has it, he only works one day a week :o)

  • Heh (Score:3, Funny)

    by Pingular ( 670773 ) on Wednesday December 03, 2003 @12:26PM (#7618995)
    Manferdelli is the general manager for Windows security at Microsoft
    The title is also called 'The guy who sits round doing nothing' at Microsoft HQ.
  • by terradyn ( 242947 ) on Wednesday December 03, 2003 @12:26PM (#7618999)
    So I guess slashdot has gotten to the point where they don't even bother linking to an article since no one actually visits the sites anyway.
  • by artemis67 ( 93453 ) on Wednesday December 03, 2003 @12:26PM (#7619000)
    All your BIOS are belong to us.
  • Link to article (Score:5, Informative)

    by Chalybeous ( 728116 ) <chalybeous@@@yahoo...co...uk> on Wednesday December 03, 2003 @12:27PM (#7619012) Homepage Journal

    The link above appears to be to /.
    Here [itmanagersjournal.com] is the article on the IT Manager's Journal site.

  • Another MS ploy. (Score:2, Insightful)

    by Anonymous Coward

    Microsoft is equiping all its people and MCSEs with early version of this stuff along with glossy brochures to hand out to the dumb suits that sign the checks. They won't sell this on technical merit, they're selling it to the PHBs. As always.

    If you're forced to install this crap, break it, make sure it doesn't work. That's how we got rid of Exchange and had free software come into our company with just over 4500 people.
  • by RLW ( 662014 )
    ... when Microsoft earns the trust of the computing public then we'll trust Microsoft. Of course by then the Sun will be a red giant and humanity will be living on distant worlds.
  • Perfect article! (Score:4, Insightful)

    by onyxruby ( 118189 ) <onyxrubyNO@SPAMcomcast.net> on Wednesday December 03, 2003 @12:30PM (#7619040)
    It's the perfect article, touches Microsoft, DRM and the evil once known as Palladium! Best of all no one can read the article because it justs links back to slashdot. Everybody can shoot from the hip on this one, because once again the only link in the article wasn't even checked to see if it works. Do stories here get reviewed and selected by a seven line perl script?
  • by josquin00 ( 675292 ) on Wednesday December 03, 2003 @12:32PM (#7619067)
    Files within the NGSCB architecture will be encrypted with secret coding specific to each PC, making them useless if stolen or surreptitiously copied.

    My concern with this would be what happens when you upgrade? How do they differenciate between new hardware and "surreptitiously" copying files to a different system? I remember all of the Office XP Activiation nightmares, and I can't help but think this will turn into a complete fiasco, too.

    • by peragrin ( 659227 ) on Wednesday December 03, 2003 @01:09PM (#7619435)
      Actually what scares me most about this is what happens when your motherboard dies, you now have a new pc with the old hardware and no access to your files. Also what happens if you upgrade to longhorn 2010 do you lose access to those files. it is a standard microsoft tatic.
      • "Actually what scares me most about this is what happens when your motherboard dies, you now have a new pc with the old hardware and no access to your files."

        The potential exists, but that's not necessarily what would happen. (I imagine your music collection could end up irretrievable tho..)

        Guys, you all are forgetting something rather important. Apple and Linux. If Microsoft uses DRM in such a way that it pisses ppl off like that, do you really think ppl will just take it and not switch to alternativ
        • If Microsoft uses DRM in such a way that it pisses ppl off like that, do you really think ppl will just take it and not switch to alternatives?

          Sadly enough, I do. Admittedly Win 2000/XP doesn't crash that much, but remember pretty much everything before that. I have little experiece with Apple, but I personally have never seen one crash (I heard stories, though). I've been using Linux on all of my personal computers for many years now and I've never had it crash on me (hardware failures aside).

          This

        • Short story. My roommate and I were ripping our cds a couple of years ago. I used an mp3 ripper he used windows media player. 1 month after his hard drive died. great all he has to do s restore his music files from backups on cd right. nope he never disabled DRM so the files and all 14 wma disks(yes that's right nearly 10 gigs and they are all legit christian music) were useless the drm wouldn't play cause it wasn't the same computer. So much for DRM
          • Yah you shoulda backed up your license file thing. Microsoft gave you an out, you didn't take it. Not their fault you lost data.

            I'm not a proponent of DRM. I think it's silly. I'm not defending Microsoft. I have the same fears everybody else does. However, I'm not having a panic attack about it because Microsoft is still dependent on people giving them money. They have to have smiles on their faces to give them money. Microsoft only has so far they can go.
    • This is from memory and might be wrong, but hey, it's slashdot ... NGSCB is dependent, among other things, on a little hardware cryptographic doohickey (that's the technical term) called a Trusted Platform Module. The TPM lives on the motheboard and contains a unique machine ID -- although the abstraction model does not allow direct access to the machine ID, it just allows verification that a signature was generated by that machine. Upgrade components in the machine (other than the mobo) and you should be f
  • huh? (Score:2, Insightful)

    NGSCB is an operating system kernel within an operating system kernel -- the larger of which will resemble the conventional Windows system. But the other part, which Manferdelli called the "Nexus mode" and said is entirely optional for the user, is the "trusted computing" model that Microsoft, Intel, and organizations such as the Record Industry Association of America are so hot to get the general public to use. Why? Because it will allow only one user per system and per application, and it will be much ea
  • by MikShapi ( 681808 ) on Wednesday December 03, 2003 @12:37PM (#7619128) Journal
    For those who don't understand what "Trusted" Computing, DRM, NGSCB and friends are all about, but do want to be awakened to reality - here's a red pill [cam.ac.uk].
  • repeat after me... (Score:5, Insightful)

    by BubbaTheBarbarian ( 316027 ) on Wednesday December 03, 2003 @12:38PM (#7619137) Journal
    Ok, repeat after me...

    Every attempt to lock down ID's, every attempt at DRM, every attempt at hardware ID (remeber Intel's great Proc Id idea?) has failed.

    Not only has it failed, but the backlash they have caused has made the problem they were to solve worse. True, this is a real threat to peace, love and freedom, but in the end, the consumer decides, and while the unwashed are unwashed, if you piss them off enough, they will find something else, and the tend to find it with a speed that is previsouly to be unthought of (remember Napster?).

    Does that preclude us fighting these type of initiatives? No, but at the same time announcing the End Of The World is a bit rash...

    What's Next - Scheduled Meetings
    Thursdays 2600 GMT
    • by GoofyBoy ( 44399 ) on Wednesday December 03, 2003 @12:50PM (#7619276) Journal
      >every attempt at DRM,

      Not sure if you would consider this as DRM but CD-key which are verified online such as HalfLife or Quake3 are pretty succesful.

      Also Windows XP activation would also be considered "succesful enough".
      • by Anime_Fan ( 636798 ) <slashdot@sjoe[ ]d.net ['lun' in gap]> on Wednesday December 03, 2003 @01:08PM (#7619427) Homepage
        Also Windows XP activation would also be considered "succesful enough".

        They were successful? Oddly, I seem to remember licence keys to corporate/enterprise versions of Windows XP before I could even try and purchase a copy.

        This didn't change much with SP1, despite the fact that said master keys were removed.

        If you only look at Windows XP Home, it isn't pirated much (due to Windows XP Professional being freely available anywhere). Everyone I knows hate it due to the fact that one has to call Microsoft Support every once in a while.

        HalfLife didn't check keys in LAN. And I never had problems with Quake3 servers.

        So, I'd have to say they aren't in the very least successful.
        • Everyone I knows hate it due to the fact that one has to call Microsoft Support every once in a while.

          My girlfriend's PC has been running a (pre-installed) copy of XP Home for a little over a year now, and we've not had to call MS Support once. My PC has been running XP Pro since January, and despite futzing around with hardware, I've not had to call MS Support either, although I did have to reactive it once. That was fine, though - I did it electronically with no hassles at all.
        • by slux ( 632202 )

          HalfLife didn't check keys in LAN. And I never had problems with Quake3 servers.

          It's true that LAN gaming is still there but for many people it has really decreased in significance after internet gaming really took off. I haven't bothered to take my computer to a friend's place in *years* and I believe a lot of people are the same. LAN gaming is really insignificant and with more and more people getting faster connections it will probably become a thing in the past except for huge LAN parties (that will

      • Yes, it was successful at encouraging me to build my next PC with Linux as the only OS.
      • by Hobbex ( 41473 )
        Not sure if you would consider this as DRM but CD-key which are verified online such as HalfLife or Quake3 are pretty succesful.

        Not that I share the grandparents optimism, but this isn't DRM. What it has done is basically changed from charging for a copy of the game, to charging for being able to connect to online game servers (you don't need DRM to charge for accounts).

        Of course, it only works because the server operators play along. If I were a server operator, I would think if I'm controlling that pla
    • in the end, the consumer decides

      I was thinking something along the same lines ...

      Everyone seems to be running around with their heads cut off as if DRM is the next doom-a-thon, but at the same time, how is it ever going to be widely implemented if no-one chooses to buy it and use it?

      I think the idea has merit within obvious realms - such as inter-business documents or what-not, but I really don't see the point of using anything than just PGP to sign/decrypt and secure your files.

  • by NeoSkandranon ( 515696 ) on Wednesday December 03, 2003 @12:38PM (#7619143)
    Windows Security GM Talks NGSCB (Palladium)

    Was I the only one who initially read GM as Game Master?
    • Was I the only one who initially read GM as Game Master?

      Hey, Windows security is often a crap shoot...

      Rimshot
    • General Motors.

      That put a different very spin on the headline...

      --RJ
      • hehe. Back when I was reading up on biofuels, they kept mentioning GM soybeans and what not. I assumed that General Motors had their own specially designed soybeans that were good for biodiesel. Took forever before I realized that GM meant Genetically Modified.

        So now I read this article and wonder why Microsoft's security guy has had his genes modified. I figure he is bio-paladiumed so MS can be certian the information he knows is secure :)
  • optional is good.... (Score:5, Interesting)

    by smd4985 ( 203677 ) on Wednesday December 03, 2003 @12:40PM (#7619173) Homepage
    if the article is accurate, MS says the trusted computing feature can be optionally enabled/disabled. glad to hear this. what is more relevant is whether the user will have the option to run certain applications in untrusted mode. i fear that software makers will bind users hands.
  • Sealed storage (Score:5, Insightful)

    by Kefaa ( 76147 ) on Wednesday December 03, 2003 @12:47PM (#7619239)
    Say anything else, but sealed storage is a simple concept, we control what can be saved. What we need to be concerned with is how they secure it. If sealed storage is at the hardware level, then the "sealed PC" MS has been seeking for years will be a reality.

    How can you install Linux, BSD or WinXP if the device itself requires the OS to authenticate? You can't. Sure you may be able to crack a work around, but what company will run software that is in place via crack?

    This brings up the next issue, what happens when you replace your box? We have heard of all the fun people have had with XP licensing and system upgrades. Do you get to keep all those MP3s or do they not belong to the box. If you can authenticate on a second box, then you really don't have a secure system using the box.

    While MS likes to dismiss these as "we are working on it" they will again be in a position to dictate their use. By the time grandma learns all here files are now secure and she must pay to move them to her new box, it will be too late. This idea that we can somehow wait for MS to figure out a solution in secret that we can all live with is crazed.

    If we are going to take a secure machine approach it will need to be a standardized one, open for all to use. I don't think we will see MS jumping to support that concept.
    • Actual example. (Score:3, Interesting)

      by gillbates ( 106458 )

      This has already happened. About 4 years ago, my college was re-imaging a bunch of Compaq servers with Windows NT when half of them suddenly died.

      Turns out, the servers were sold when Compaq still sold a version of Windows NT, at prices considerably more expensive that Microsoft. To keep people from buying the machines without an OS and installing their own, the BIOS detected the OS, and if it was not a signed, Compaq-built copy of Windows NT, it refused to load it.

      Fortunately, we had a support con

  • Absurd (Score:5, Insightful)

    by DonkPunch ( 30957 ) on Wednesday December 03, 2003 @12:55PM (#7619321) Homepage Journal
    Microsoft sells an OS vulnerable to buffer overflow exploits.

    The obvious solution for secure computing -- better quality control on their code.

    The Microsoft solution -- anything but better quality control. Limit the user's control of the machine. Enact a code-signing scheme. But, whatever you do, don't make us audit millions of lines of our own code.
    • The GM did point out, somewhat correctly, that buffer overflows and the like are industry-wide issues. And I'm not entirely sure how, if at all, Windows does things like setuid, but in Unix OSes, at least, poor coding by third-party vendors can be exploited even in a perfectly coded OS. The trick to avoiding these is to come up with some way to avoid buffer overflows, regardless of who wrote the code (like ProPolice, etc).
    • Re:Absurd (Score:4, Informative)

      by stubear ( 130454 ) on Wednesday December 03, 2003 @01:20PM (#7619531)
      Actually they're doing both. Much of the .Net initiative is about managed code which will eliminate buffer overflows, thus eliminating security exploits. Longhorn will be built with a lot of managed code.

      Palladium, however, is about extending this security at both ends. The internet is great but it suffers from being based around the notion of naive trust instead of verifiable, secure trust. While this worked in the eary days of the internet, it simply does not work now. With computers being connected via broadband and always connected to the internet, OSes and the way they communicate internally and externally have to begin to build a system whereby they can verify, and thus trust, those communicating with the system, whether it be via IM, e-mail or through VPN.

      Simply put, the internet is no longer a hobby. It is quickly becoming as important a part of our infrastructure as electricity and roads, to name a few. To this end, there must be a way to ensure that communication via the internet is secure and can be trusted. Palladium is only one method to obtain this trust.
      • Re:Absurd (Score:5, Interesting)

        by Znork ( 31774 ) on Wednesday December 03, 2003 @02:49PM (#7620421)
        "The internet is great but it suffers from being based around the notion of naive trust instead of verifiable, secure trust. While this worked in the eary days of the internet, it simply does not work now."

        "Simply put, the internet is no longer a hobby. It is quickly becoming as important a part of our infrastructure as electricity and roads, to name a few."

        Indeed. That's why my telephone will not allow me to dial someone while it registers that I'm playing music in the background. It's also why all my mail is opened by the post office to ensure I'm not shipping any copyrighted material in it, and why my electricity shuts off when I try to use it to play a CD I've borrowed from a friend. And why my car will shut down if I go over the speed limit.

        Oh, wait, that's not at all how it works, is it?

        Secure, verifiable trust has never been part of our infrastructure, and the internet does not increase the need for it.

        Communication over the internet is not secure, but then neither is any other form of communication wether by mail, fax, phone or physical delivery, unless you take certain steps to ensure it is.
    • Find me an OS that isn't vulnerable to buffer overflow exploits.

      the BSD family is susceptible, so is Linux and MacOS. Hell, even Gameboy Advance or PalmOS are just as likely to be vulnerable.

      The problem with Microsoft OS's is their security model. The OS allows scripts in any email or webpage to run on by default, things like that. Of course, they promise that this Palladium stuff will fix that, but really it won't, because Microsoft doesn't see random emails and webpages as untrustworthy -- they see use
      • SELinux and it's ilk, while not invulnerable to buffer overflows, are a LOT less vulnerable. You can happily get your buffer overflow in such systems, but that generally won't get you root access - rather the program you just overflowed will get terminated and restarted and you'll be back where you started. It's a good system (and integrated into Linux 2.6) so check it out.

        Jedidiah.
  • by hanssprudel ( 323035 ) on Wednesday December 03, 2003 @01:04PM (#7619395)
    The bottom line: Do you trust Microsoft? That's ultimately what this is all about.

    I don't understand what it is about these technologies and their evangelists that makes it so easy for them to wooll over listeners and analysts eyes. I mean, the author of the article quotes Stallman's and Sulzberger's comments, but they seem to go in one ear and out the rest.

    This isn't about whether one trusts Microsoft. People who dislike Palladium and TC are not tinfoil hatters who think that once it is deployed Microsoft will use it to take over the world, or whatever. The bottom line is exactly what Sulzberger says: How much control should users have over their own systems.

    Microsoft's representative covers this up in invented technical terms, and talks about "security" and "trust" because those words sound good to the uninitiated, but that is just a smokescreen for the true neature (not a lie - they are upfront about what the system includes, they just spin it so people Chris Preimesberger will miss the point).

    The point is this: every piece of "security" and "trust" that can be gained from Palladium is gained by palladium taking away from the user control of his own computer. Once that control is removed, ISPs can "secure" and "trust" that the user has his system configured as they mandate (see the Cisco router story). Microsoft can "secure" and "trust" that their software is licensed and registered. The record companies can "secure" and "trust" that their songs cannot be copied, ALL BECAUSE ULTIMATELY THE COMPUTER, NOT THE USER, IS IN CONTROL!

    The question he asked "Does Microsoft have a back door" is stupid. Nobody serious believes that Palladium contains a backdoor so that MS can take over the computer. They believe the point with Palladium's design is that software can be installed with restrictions that the user cannot circumvent, and that people will be forced into installing such software, hostile to themselves, on their own PCs, in order to exchange data and connect to the Internet.

    The reported responses from the MS representative give us absolutely no reason to answer "no" to either of Sulzberger's questions, even though the article claims so. In fact, when MS say things like, "We are building a scalable, distributed credential-based security model here," and list features of "attestations with authenticated code that is affiliated with only that particular process" - that is exactly what Sulzberger and Stallman are talking about. The Palladium computer will attest - BEYOND THE USERS CONTROL - whether the computer is running software that is "trusted" by the counterpart and hostile to the user, exactly so that the counterpart can mandate the use of such software (read DRM).

    The fact that Microsoft tell us that the code will be open for review gives absolutely no confort. It is not the code, but the very concept of Palladium that is frightening beyond belief. Apparently Microsoft have nothing to fear regarding being open about it, as for some reason so many people cannot seem the grasp the point that Stallman, Sulzberger, and myself scream into the void!
    • As far as I see it, Palladium has two goals:

      (1) Make subscription-based software a viable buisness model. This one is obvious. Microsoft has been trying to do this for years. Their solution is typical for a monopoly. It over-reaches. If you want people to subscribe to your OS, don't force them to. Offer the subcription as a service. It comes with technical support and free upgrades as long as you pay. The other poor users will have to do the best they can with your "patches" and upgrade-editions.

    • > The question he asked "Does Microsoft have a back door" is stupid. Nobody serious believes that Palladium contains a backdoor so that MS can take over the computer. They believe the point with Palladium's design is that software can be installed with restrictions that the user cannot circumvent, and that people will be forced into installing such software, hostile to themselves, on their own PCs, in order to exchange data and connect to the Internet.

      I'm not sure where you grew up. Where I

    • The bottom line: Do you trust Microsoft? That's ultimately what this is all about.

      If you DON'T trust Microsoft, you shouldn't have a single byte of MS software on your computer.
      It's a deceptively simple philosophy.

    • The way I look at it is it is up to the users to decide how much control they want to have over their systems. I don't have to network with them and they don't have to network with me if they think it might not be safe, or if they don't want to take any responsibility for it.

      The more computers under Microsoft's control the better, IMO. Maybe I'll be getting less traffic from viruses and worms. Maybe I'll be getting fewer questions about how things work since I won't ever be working with that technology
  • by swb ( 14022 ) on Wednesday December 03, 2003 @01:05PM (#7619404)
    Manferdelli is the general manager for Windows security at Microsoft, and his presentation was mostly about the technical, not ethical or other considerations involved in this system. His position is understandably different from those of privacy and free software advocates who assert that Microsoft's elaborate security is designed to lock users into Microsoft software at the expense of privacy and choice.

    This is a classic example of a propaganda technique. An organization with an goal that is unpopular casts a spokesman as an authority on that goal, but only on a narrowly defined scope. This serves to limit the terms of the debate, as well as to get people to accept tenets of the organizations goals.

    In this case, Manferdelli is only an expert on the technical aspects of secure computing. The concept of secure computing is something that a lot of people opposed to Palladium actually accept. It's possible to win converts or at least marshall good PR by getting people to "agree" with Microsoft's technical goals, even when they disagree with the larger implementation and motivation.

    This technique is common in totalitarian countries. For example, you may be opposed to Nazi eugenics, but Dr. X, who is only an expert on the medical problems associated with poor breeding, can quickly have you agreeing that birth defects and disease are bad. Once you're that far, why, the overall issues and conclusions of eugenics are much more reasonable and less objectionable.

    Overall, this technique works great, and you might even find it in use in your place of work. You limit the scope of debate, removing the things that people really object to, and then get them to agree to things "on their own merits", which makes the overall plan more palatable.
  • by Anonymous Coward
    "Trusted Computing"

    The term is pure genius, it implies security/safety but doesn't address who is protected from what.

    In fact the whole thing seems to be founded on the dubious premise that information (programs/data) can be transferred without transferring complete freedom as to it's use (physically if not legally).

    This is patently nonsense.

    A case in point is the remarkable lack of electronic money on the planet (like Mondex).

    Banks/governments do not trust that real but virtual "cash" can be transacte
    • by The Snowman ( 116231 ) * on Wednesday December 03, 2003 @01:36PM (#7619712)

      I see no reason why human ingenuity is supposed to freeze at the point this technology is released...

      I see a reason: DMCA. It won't stop people, but it will chill public disclosure and freedom of speech, as we know from experience. It can stop the knowledge from reaching a critical mass. People who would circumvent DRM and Trusted Computing are a minority, and if the DMCA can keep it that way, we will never reach critical mass and stop DRM and TC.

  • kudos to microsoft for coming up with another business model. it wasn't enough to force vendors and users to pay for windows, and break all kinds of anti-trust laws. those damn pesky linux cd's still work. and even though they get their $50 or whatever OEM fees, it still isn't the same. now, they've got the perfect strategy, force manufacturers to make hard that can only run windows and nothing else. if you can't beat, beat them over the head. awesome. think i'm going to buy some microsoft stock.
  • I wonder if Trusted Computing could be applied to SMTP to help stop spammers. The problem with spam is the internet's email system has no accountability and, often enough, little or no SMTP authentication (some ISPs filter by IP, but there is no login).

    The Slashdot community always says we need digital signing of all emails. While I trust Trusted Computing about as much as I trust John Ashcroft, it just might be a step toward stopping spam.

  • Does the Nexus have a back door to Microsoft or anybody else, I asked Manferdelli directly following the presentation. "No" was his simple answer.

    Am I supposed to trust this answer ?
    Ya, right.
  • DRM and Trusted Computing would be a reasonable idea if it wasn't being designed and advocated by Microsoft. They do have an agenda to "get Linux" in any way they can, it would be convenient for them to say that the Trusted Computing model can't work if the code is made public.
  • The Grand plan of MS obiviously is that first they make current Windows boxes too dangerous to connect to the internet for normal non-techie people (all the worms, viruses, ad- and spyware etc).

    Then they introduce Palladium, and any user who agrees to run only MS-signed code is safe, and any user who at least enables Palladium is safe from running non-signed code at any time (such as a virus trying to start automatically when the computer boots) without being prompted.

    And it'll even work as long as they m
  • I want hardware and software crypto, but I can only reasonably trust people who share the same values as I do.

    If ASUS and A-BIT start putting out motherboards that only support the NGSCB BIOS (is it more than BIOS? is there hardware too?), you can bet I'll be supporting the underdog motherboard manufacturer that uses verifiable code built from open source.

    save us linuxbios [linuxbios.org]! What other open source BIOS projects are out there?
  • Is he serious? (Score:3, Interesting)

    by gillbates ( 106458 ) on Wednesday December 03, 2003 @02:45PM (#7620380) Homepage Journal
    Today most people who have a computer do not really completely control their computer. They run a Microsoft OS, and they will never put any sniffers on their connection to the Net. Viruses, Trojans, and worms parasitize their machines. In general, it is hard to get any Microsoft system to do what you want. But some folk actually have pretty good control of their computers. Palladium is designed to ensure the continuation of the situation for most users, and to prevent the sale and use of computers which can be controlled by the user. [emphasis mine]

    Let's take this apart:

    do not really completely control their computer. They run a Microsoft OS...

    Quite true - those who run an MS OS have very little control over what their machine does. They don't have the source, so they can't fix the bugs, and their machine is constantly prone to virus infection.

    In general, it is hard to get any Microsoft system to do what you want.

    Nothing new, this has been the case for quite some time...

    But some folk actually have pretty good control of their computers.

    Translation: some folks use Linux.

    Palladium is designed to ensure the continuation of the situation for most users, and to prevent the sale and use of computers which can be controlled by the user.

    Translation: Party's over folks. We're going to make it so that you can't install Linux, because we don't like it. I really can't say enough about how evil this is: they want to take control of a person's PC away from the owner?! Consider what kind of mindset would want complete control over someone else...

    Some features Microsoft will introduce in the future:

    • Web publishing fees. For an additional $15/month, you can use your MS Palladium enabled OS to publish web pages! Of course, you'll still have to pay for hosting.
    • Developer licensing fees. Now Microsoft has made it easier than ever to develop for Windows! With the new bulk discount program, royalties are charged only when someone buys your program.
    • Annual subscription rates: The new annual rate of $350 saves you $10 over the $30 monthly rate!
    • Free automatic system cleanup - brought to you by the RIAA and MPAA. For an additional $5/month, System Cleanup will ensure that you have no infringing copies of copyrighted works. Avoid a costly RIAA lawsuit!

    This is evil, pure and simple. It's not merely designed to stop copyright infringement - this is designed to force anyone who uses a PC to pay annual or monthly subscription fees to Microsoft.

    Yeah, I know. But what should we expect from a convicted felon?

    I guarantee I will not buy a Palladium equipped PC. I'm serious - I'll start building my own from processor and circuit board if I have to.

  • Isn't that like finding someone who's homeless and giving them the title of National Economic Advisor? Isn't it like the NTSB giving Firestone [forbes.com] an exemplary safety award?

    Windows Server 2003 [microsoft.com] is a small step in the right direction, except it's 10 years late. [by the way - I LOVE the caption [microsoft.com] on the Windows 2003 page - I initially misread it as "do less with more".

    I like to tell users the reason they are paying me $xxx to repair their computer is because Microsoft was busy working on Clippy [newshax.com] instead of f
  • Lovely. Now we can be subjected to another barrage of alternate meanings from people who for some strange reason think themselves witty.
  • Microsoft's agenda (Score:4, Interesting)

    by RML ( 135014 ) on Wednesday December 03, 2003 @03:57PM (#7621168)
    Emphasis added...

    "Today
    most people who have a computer do not really completely control their computer. They run a Microsoft OS, and they will never put any sniffers on their connection to the Net. Viruses, Trojans, and worms parasitize their machines. In general, it is hard to get any Microsoft system to do what you want. But some folk actually have pretty good control of their computers. Palladium is designed to ensure the continuation of the situation for most users, and to prevent the sale and use of computers which can be controlled by the user.

    If you don't read that closely, it might look like he's talking about how viruses and worms reduce many people's control over their computer. But he's really saying that Microsoft wants to ensure that everyone doesn't really control their computer.

    "Since today
    Microsoft's control is not complete over machines running a Microsoft OS, many home users copy and re-distribute popular songs, whose copyrights the home user does not have. So the real issues are not clear, and discussion of Palladium in most newspapers is centered on political questions of copyright law and practice."

    What's not clear? He all but says that Microsoft wants to control your computer to stop you from copying songs - and, I assume, software.

    Really, I was expecting something at least a little subtle.
  • Having today just dealt with the latest round of Unforeseen Consequences of data backups and restores in the forest of scripts that our Resident Geniuses {tm} made for our new Windows XP client base, I can say with great confidence that Microsoft et al are digging themselves a hole so deep that not even they can DirectX (used as a verb) themselves out again.

    Humans perform technical work in various ways, and all this security blather break, breaks, and breaks those modes of behavior. Version 1.0 of whate

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...