DV Hardware bringing you the hottest news about processors, graphics cards, Intel, AMD, NVIDIA, hardware and technology!

   Home | News submit | News Archives | Reviews | Articles | Howto's | Advertise
DarkVision Hardware - Daily tech news
October 22, 2016 
Main Menu
News archives

Who's Online
There are currently 70 people online.


Latest Reviews
Zowie P-TF Rough mousepad
Zowie FK mouse
BitFenix Ronin case
Ozone Rage ST headset
Lamptron FC-10 SE fan controller
ZOWIE G-TF Rough mousepad
ROCCAT Isku FX gaming keyboard
Prolimatech Magnetic Pin

Follow us

Atari founder claims TPM will defeat pirates

Posted on Wednesday, May 28 2008 @ 23:00:19 CEST by

Nolan Bushnell, the founder of Atari, claims the trusted platform module (TPM) module will stop piracy of computer software and games:
“There is a stealth encryption chip called a TPM that is going on the motherboards of most of the computers that are coming out now. What that says is that in the games business we will be able to encrypt with an absolutely verifiable private key in the encryption world – which is un-crackable by people on the Internet and by giving away passwords – which will allow for a huge market to develop in some of the areas where piracy has been a real problem,” said Nolan K. Bushnell, the founder of Atari, at Wedbush Morgan Securities annual management access conference, reports Gamesindustry.biz web-site.

A Trusted Platform Module offers a combination of hardware and software cryptographic methods to secure data. Each TPM comes with its own cryptographic key, which is unique. On the one hand, TPM can ensure that certain programs or unauthorized users cannot access certain data, on the other hand, it sports such features as remote attestation, which allows software developers to ensure that a program is used strictly on one system. But such limitation may raise concerns particularly from video games enthusiasts who upgrade PC hardware pretty often and will hardly appreciate purchases of games that they already own.

Very few systems nowadays support TPM, but the usage of the technology is increasing and in several years time TPM may become much more common. It should be noted that even though the unique RSA key that is recorded into a device during production is still vulnerable while a program that has obtained it from the TPM is utilizing it to complete encryption/decryption operations.



DV Hardware - Privacy statement
All logos and trademarks are property of their respective owner.
The comments are property of their posters, all the rest © 2002-2016 DM Media Group bvba