[Freedombox-discuss] ARM's Trust Zone and TPM
dragonwisard at gmail.com
Wed Jun 27 21:47:17 UTC 2012
-----BEGIN PGP SIGNED MESSAGE-----
On Wed, 27 Jun 2012, freebirds at hushmail.com wrote:
> Could FreedomBox please ask Marvell whether their motherboard has
> ARM's TrustZone or Trusted Platform Module (TPM). They both
> generate a visible UUID and make hardware UUIDs visible. TrustZone
> and TPM have digital rights management and enable tracking by the
> media industry, hackers, government, etc. ARM's TrustZone
> description is at
> FreedomBox needs to have open source leftcopy hardware such as Qi
> hardware. See http://en.qi-hardware.com/wiki/Main_Page
> Anonymous software such as openVPN, MacChanger and TOR and a Linux
> OS are not enough to ensure privacy. The MAC address of the wifi
> card, the MAC address of the bluetooth card and the processor
> serial number are visible even when not connected to the internet.
> If Marvell's motherboard has TrustZone, TPM or its equivalent or
> Marvell's processor serial number is visible, please ask Marvell to
> remove them. Or ask a manufacturer for a truly private processor
> and motherboard.
> Thank you.
I'm a little confused about all this concern I've been seeing about
UUIDs. Could someone explain this to me? How exactly does it hurt your
privacy/anonymity if your CPU has a UUID?
Or, asked another way, what is the attack vector? What would a hacker or
government or other adversary need to do in order to track someone by
Please help me to understand this threat.
Ben the Pyrate
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
-----END PGP SIGNATURE-----
More information about the Freedombox-discuss