DV Hardware bringing you the hottest news about processors, graphics cards, Intel, AMD, NVIDIA, hardware and technology!

   Home | News submit | News Archives | Reviews | Articles | Howto's | Advertise
 
DarkVision Hardware - Daily tech news
December 5, 2016 
Main Menu
Home
Info
News archives
Articles
Howto
Reviews
 

Who's Online
There are currently 81 people online.

 

Latest Reviews
Zowie P-TF Rough mousepad
Zowie FK mouse
BitFenix Ronin case
Ozone Rage ST headset
Lamptron FC-10 SE fan controller
ZOWIE G-TF Rough mousepad
ROCCAT Isku FX gaming keyboard
Prolimatech Magnetic Pin
 

Follow us
RSS
 

Atari founder claims TPM will defeat pirates

Posted on Wednesday, May 28 2008 @ 23:00:19 CEST by


Nolan Bushnell, the founder of Atari, claims the trusted platform module (TPM) module will stop piracy of computer software and games:
“There is a stealth encryption chip called a TPM that is going on the motherboards of most of the computers that are coming out now. What that says is that in the games business we will be able to encrypt with an absolutely verifiable private key in the encryption world – which is un-crackable by people on the Internet and by giving away passwords – which will allow for a huge market to develop in some of the areas where piracy has been a real problem,” said Nolan K. Bushnell, the founder of Atari, at Wedbush Morgan Securities annual management access conference, reports Gamesindustry.biz web-site.

A Trusted Platform Module offers a combination of hardware and software cryptographic methods to secure data. Each TPM comes with its own cryptographic key, which is unique. On the one hand, TPM can ensure that certain programs or unauthorized users cannot access certain data, on the other hand, it sports such features as remote attestation, which allows software developers to ensure that a program is used strictly on one system. But such limitation may raise concerns particularly from video games enthusiasts who upgrade PC hardware pretty often and will hardly appreciate purchases of games that they already own.

Very few systems nowadays support TPM, but the usage of the technology is increasing and in several years time TPM may become much more common. It should be noted that even though the unique RSA key that is recorded into a device during production is still vulnerable while a program that has obtained it from the TPM is utilizing it to complete encryption/decryption operations.



 



 

DV Hardware - Privacy statement
All logos and trademarks are property of their respective owner.
The comments are property of their posters, all the rest © 2002-2016 DM Media Group bvba