Microsoft created PLUTON, the next gen TPM chip. And now it’s possible to ban devices which don’t run these locked down operating systems.

  • @toneverends@lemmy.ml
    link
    fedilink
    132 years ago

    TPM chips invented in ~2004 were widely feared because they enabled this capability, but until now they have been primarily used only in corporate networks and for BitLocker hard drive encryption.

    […] Cloudflare has already shown it is possible for websites to use it to verify the humanity of a user and skip CAPTCHAs on macOS. What happens when Windows gains that ability? Linux users will be left out in the cold […]

    On an extremely paranoid note, will our government or a large corporation require a driver’s license for the internet, with a digital attestation binding a device to your digital ID in an unfalsifiable way? […]

    • @AgreeableLandscape@lemmy.mlM
      link
      fedilink
      6
      edit-2
      2 years ago

      […] Cloudflare has already shown it is possible for websites to use it to verify the humanity of a user and skip CAPTCHAs on macOS. What happens when Windows gains that ability? Linux users will be left out in the cold […]

      Archive.org, bittorrent, fediverse, ipfs, alternate clients, tor. And for the “piracy/adblock is bad how dare you” people: you make it impossible for me to access your content legitimately, I won’t loose sleep over pirating it.

      Or, if I’m being honest, mainstream media (at least in the West) is so blatantly designed for profit as opposed to any artistic/educational/informational value, that you’re really not missing much by not having access to it, and indie stuff is a lot less likely to pull any kind of DRM bullshit.

  • @thervingi@lemmy.ml
    link
    fedilink
    92 years ago

    TPM has nothing to do with security. It exists to deny people control over the device the bought.

    • Sr Estegosaurio
      link
      fedilink
      22 years ago

      I have secure boot enabled, secure boot should be used more. It’s an amazing improvement in terms of security. But obviusly I use my own keys to be able to boot linux.