The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    Disabling TPM chip?

    Discussion in 'Hardware Components and Aftermarket Upgrades' started by alphaoenz71v, Jan 20, 2008.

  1. alphaoenz71v

    alphaoenz71v Notebook Geek

    Reputations:
    0
    Messages:
    85
    Likes Received:
    0
    Trophy Points:
    15
    Simple question, is there any way to disable the TPM chip that is eventually going to be in all computer systems? Has anyone found a work around or is it still too early in its infancy? Having something like that in my system is extremely unnerving, given the current political agenda. Any insight on this would be appreciated.
     
  2. Greg

    Greg Notebook Nobel Laureate

    Reputations:
    7,857
    Messages:
    16,212
    Likes Received:
    58
    Trophy Points:
    466
    I've always had to turn ON a TPM in BIOS. Some day that option might not be available, but all you'd have to do is just not run the software in the OS that interfaces with the TPM.

    Political agenda? What? You sound like a Doomsayer :p!
     
  3. Bog

    Bog Losing it...

    Reputations:
    4,018
    Messages:
    6,046
    Likes Received:
    7
    Trophy Points:
    206
    There may be away, but given their purpose, I doubt that the design would intentionally leave a hole for people to disable them.
     
  4. camvan

    camvan Notebook Evangelist

    Reputations:
    12
    Messages:
    328
    Likes Received:
    0
    Trophy Points:
    30
    what's a TPM chip?
     
  5. powerpack

    powerpack Notebook Prophet

    Reputations:
    7,101
    Messages:
    5,757
    Likes Received:
    0
    Trophy Points:
    0
    Trusted Platform Module
    From Wikipedia, the free encyclopedia

    In computing, Trusted Platform Module (TPM) is both the name of a published specification detailing a secure cryptoprocessor that can store secured information, as well as the general name of implementations of that specification, often called "TPM chip", "Fritz chip" or "TPM Security Device" (Dell). The TPM specification is the work of the Trusted Computing Group. The current version of the TPM specification is 1.2 Revision 103, published on July 9, 2007.

    A Trusted Platform Module offers facilities for secure generation of cryptographic keys, the ability to limit the use of cryptographic keys, as well as a hardware random number generator. It also includes capabilities such as remote attestation and sealed storage. Remote attestation creates a nearly unforgeable hash key-summary of the hardware and software. To what extent the software is being summarized is decided by the software that is encrypting the data . This allows a third party to verify that the software has not been changed. Sealing encrypts data in such a way that it may be decrypted only if the TPM release the right decryption key, which it only does if the exact same software is present as when it encrypted the data. Binding encrypts data using the TPM's endorsement key, a unique RSA key burned into the chip during its production, or another trusted key.

    A Trusted Platform Module can be used to authenticate hardware devices. Since each TPM chip has a unique and secret RSA key burned in during the production, it is capable of performing platform authentication. For example, it can be used to verify that the system seeking the access is the expected system.

    Microsoft's new desktop operating system Windows Vista uses this technology as part of the feature BitLocker Drive Encryption. Available only in the Ultimate and Enterprise editions of Windows Vista[2], BitLocker encrypts the computer's boot volume and provides integrity authentication for a trusted boot pathway (i.e. BIOS, boot sector, etc.) Other volumes can be encrypted using built-in command-line tools (although not via the GUI currently). Future Windows versions are expected to have increased TPM and BitLocker support for additional cryptographic features and expanded volume encryption. BitLocker requires two NTFS-formatted drive volumes, one for Windows boot code and BitLocker operational code, and the other containing the boot volume (i.e. the volume where the operating system is stored). It should also be noted that, contrary to common misconception, the official name Full Volume Encryption (FVE) does not mean BitLocker encrypts entire drives; rather, it acts on logical volumes, which may or may not take up the entire drive.

    Generally, pushing the security down to the hardware level in conjunction with software provides more avenues for protection than a software-only solution that can be compromised by an attacker. Starting in 2006, many new laptop computers have been sold with a Trusted Platform Module chip built-in. In the future, this concept could be co-located on an existing motherboard chip in computers, or any other device where a TPM's facilities could be employed, such as a cell phone. Intel is planning to integrate the TPM capabilities into the southbridge chipset in 2008. ;)

    You asked!
     
  6. camvan

    camvan Notebook Evangelist

    Reputations:
    12
    Messages:
    328
    Likes Received:
    0
    Trophy Points:
    30
    I should have just gone there and looked :laugh:

    would you be so kind to tell me how exactly this can be used against the end user negatively in some way?
     
  7. Lysander

    Lysander AFK, raid time.

    Reputations:
    1,553
    Messages:
    2,722
    Likes Received:
    1
    Trophy Points:
    55
    DRM, tracking, and usage monitoring. Essentially a 'phone home' device.
     
  8. powerpack

    powerpack Notebook Prophet

    Reputations:
    7,101
    Messages:
    5,757
    Likes Received:
    0
    Trophy Points:
    0
    You are now asking me to think! I am not sure, will read and get back. :confused:
     
  9. camvan

    camvan Notebook Evangelist

    Reputations:
    12
    Messages:
    328
    Likes Received:
    0
    Trophy Points:
    30
    I can smell the smoke already... :p
     
  10. Bog

    Bog Losing it...

    Reputations:
    4,018
    Messages:
    6,046
    Likes Received:
    7
    Trophy Points:
    206
    In any case, I wouldn't expect a device with such purposes to have a simple (or possibly legal) method of circumvention.