{"id":1807,"date":"2008-09-08T11:00:08","date_gmt":"2008-09-08T16:00:08","guid":{"rendered":"http:\/\/www.shamusyoung.com\/twentysidedtale\/?p=1807"},"modified":"2008-09-08T09:28:42","modified_gmt":"2008-09-08T14:28:42","slug":"treacherous-computing","status":"publish","type":"post","link":"https:\/\/www.shamusyoung.com\/twentysidedtale\/?p=1807","title":{"rendered":"Treacherous Computing"},"content":{"rendered":"<p><a href=\"?p=1806\">Earlier<\/a> I linked to an article talking about the rise of the <a href=\"http:\/\/en.wikipedia.org\/wiki\/Trusted_Platform_Module\">Trusted Platform Module<\/a>.  At first I thought it was just another doomed DRM scheme, but I have since been smacked in the head with the brick of enlightenment. Several people pointed out that not only is it not a joke, it&#8217;s already <a href=\"http:\/\/en.wikipedia.org\/wiki\/Trusted_Platform_Module#TPM_Hardware\">partly implemented<\/a>.  <\/p>\n<table width=\"430\" align=\"right\">\n<tr>\n<td><code><object width=\"425\" height=\"344\"><param name=\"movie\" value=\"http:\/\/www.youtube.com\/v\/UnXU7z2_6Jg&#038;hl=en&#038;fs=1&#038;rel=0&#038;color1=0x5d1719&#038;color2=0xcd311b\"><\/param><param name=\"allowFullScreen\" value=\"true\"><\/param><embed src=\"http:\/\/www.youtube.com\/v\/UnXU7z2_6Jg&#038;hl=en&#038;fs=1&#038;rel=0&#038;color1=0x5d1719&#038;color2=0xcd311b\" type=\"application\/x-shockwave-flash\" allowfullscreen=\"true\" width=\"425\" height=\"344\"><\/embed><\/object><\/code><\/td>\n<\/tr>\n<\/table>\n<p>Its advocates are calling it &#8220;<a href=\"http:\/\/www.escapistmagazine.com\/news\/view\/84079-Atari-Founder-PC-Piracy-About-to-be-Eradicated\">uncrackable<\/a>&#8220;, but we know better than <em>that<\/em>.  Still, let us agree that it is very difficult to break.  It operates at the hardware level, the operating system level, and the application level. The machine, the operating system  and the program you&#8217;re trying to run all need to agree that you have the right to do whatever it is that you&#8217;re trying to do.  Hacking around such a thing is non-trivial, because your machine is not on your side. Your machine does not trust you, or even <em>itself<\/em> to a certain extent.  <a href=\"http:\/\/www.cs.auckland.ac.nz\/~pgut001\/pubs\/vista_cost.html\">This article maps out the performance cost and absurdity<\/a> of Vista&#8217;s <strong>current<\/strong> content protection, which is doubtless just a small part of their eventual overall TPM scheme.<\/p>\n<p>At the heart of the thing is the assumption that the user is not to be trusted, and therefore control of the machine should be shifted away from the user and to a remote entity.  Such an entity can decide what programs you can use, what documents you can read, and who you may share them with.  <\/p>\n<p><!--more-->The Bad News:  Many of us have the chip already in our PC and we don&#8217;t even know it.  The Worse News:  Windows Vista already supports TCM at some level. So, two of the three layers are in place.   Currently TCM must be enabled by the user, but the plan seems to be to wait until &#8220;everyone&#8221; has TCM-compliant machines and then begin rolling out software which requires it.<\/p>\n<p>The idea is that applications will come encrypted.  Data will be encrypted. You will need to authenticate over the net in order to gain temporary access to the software or data.  At its most insidious the system could be used to turn access to all commercial software (your programs) and data (your music files, movies, documents, etc) into a service for which you must pay. With control shifted from the user to a remote server, it will become increasingly difficult to protect yourself against invasions of privacy on the part of your software and data &#8220;providers&#8221;. Your data is no longer as safe as you make it, but as safe as some third-party can make it.  <a href=\"http:\/\/www.gnu.org\/philosophy\/can-you-trust.html\">This article<\/a> by <a href=\"http:\/\/en.wikipedia.org\/wiki\/Richard_Stallman\">Richard Stallman<\/a> charts the darkest possible course through that grim future:  Computers that refuse to run free operating systems, operating systems that refuse to run free software, software that refuses to grant access to data without also getting approval  from a third party.  Bypassing the system would mean modifying your hardware (like modding an XBox to play pirated games) as well as hacking the depths of the operating system.  As a bonus, doing either would be illegal.  (Not just &#8220;license violation&#8221; or &#8220;copyright violation&#8221;, but go-to-jail sort of illegal, thanks to the <a href=\"http:\/\/en.wikipedia.org\/wiki\/Dmca\">DMCA<\/a>.)<\/p>\n<p>This paints a bleak picture, although if it was suddenly implemented as Stallman predicted it would fail, because no matter how exercised we get, how mad we are, or how many letters people send to congress or how they vote, the system is now and will forever be shaped by the &#8220;average user&#8221;.  I&#8217;m talking about the people who don&#8217;t care about technology or software except as a means to an end.  Bell curve time:<\/p>\n<p><table width='600'  cellpadding='0' cellspacing='0' border='0' align='center'><tr><td><img src='https:\/\/www.shamusyoung.com\/twentysidedtale\/images\/freedom_control.jpg' class='insetimage' width='600' alt='Bell curve. Richard Stallman, Shamus Young, Joe Average, Nolan Bushnell, Bill Gates' title='Bell curve. Richard Stallman, Shamus Young, Joe Average, Nolan Bushnell, Bill Gates'\/><\/td><\/tr><tr><td class='insetcaption'>Do not confuse the left \/ right, blue \/ red motif for American politics.  We&#8217;re talking technology here, and if we bring politics into this it will make a hash out of the discussion before it even gets started.<\/td><\/tr><\/table><\/p>\n<p>On the far left are the true security fanatics.  The Richard Stallmans, who will write all their own software if that&#8217;s what it takes to keep their system secure.  Then there are the mid-range paranoids like me, who care about security but are grudgingly willing to tolerate a certain degree of intrusion and DRM for the sake of getting on with other concerns.  In the middle is Joe Average, who is oblivious to security problems until the computer stops working or his data is stolen.  To the right of him are the control advocates like Nolan Bushnell, who support DRM and &#8220;Trusted Computing&#8221; and other invasive security as an acceptable means to some other end, and who probably haven&#8217;t really thought about the greater implications of these systems.  To the far right are the real jerks, the people who see domination of the user&#8217;s machine as an end in itself because that power is worth a fortune.  Bill Gates isn&#8217;t really the worst, but he&#8217;s the most famous and has come to be the poster boy for this sort of thing. And his efforts to date have been pretty <a href=\"http:\/\/www.cs.auckland.ac.nz\/~pgut001\/pubs\/vista_cost.html\">noteworthy<\/a>.<\/p>\n<p>Despite the money wielded on the right and the free (free as in the sense of &#8220;free speech&#8221;) software we get out of the left (GNU\/Linux) the most powerful actors in this battle are the people in the middle.  They will <em>always<\/em> take the path of least resistance, and companies depend on these people.  Microsoft may have more power than SHODAN and more money than King Xerxes, but they live and die on their market share.  And that means they have to keep those people in the middle happy.<\/p>\n<p>I don&#8217;t think we need to worry about the future that Stallman predicted where you simply can&#8217;t buy hardware that will run GNU\/Linux.   (We&#8217;re being nice to Stallman today.)  People rely on it, and so there will be a market for open machines.  And if there&#8217;s a market, <em>someone<\/em> will fill it. In the worst-case scenario, you might not be able to get an open machine from Dell or HP, but you&#8217;ll be able to get them. TPM is toothless without an operating system backing it up.  So as always this comes down to a battle of the operating systems.  <\/p>\n<p>Those average users want to make their Power Point files and PDFs while listening to music and playing the occasional round of Bejeweled.  If they bought a computer that made all of that too difficult, they would learn the easiest way around it so they could get back to what they were doing.  I tend to sneer at these people from time to time (as the Stallmans no doubt sneer at dolts like me) but the truth is that they aren&#8217;t stupid.  They just don&#8217;t care. They don&#8217;t care in the same way that most drivers don&#8217;t care about anti-lock brake laws and fuel mixture regulations.  They care about using the car to go somewhere and simply don&#8217;t have <em>time<\/em> for a thousand mechanical and political details.  <\/p>\n<p>There is a hassle to the individual user in switching operating systems.  It&#8217;s a big one.  It&#8217;s so big that people still choose Windows, even though it costs over $100 and the alternative is free, more stable, and more secure.  I know because I&#8217;m one of those people. I want to be able to run my games and use all my familiar programs and share files with other people. But that Windows advantage is only genuine (tee hee) as long as it can win in the &#8220;hassle-free access to software and data&#8221; department.  If TPM gets in the way of this, then people riding the path of least resistance will quickly flow towards open source.  <\/p>\n<p>Requiring an internet connection every time the user runs a program is going to cause a lot of problems.  Mobile users need their stuff to work even when they don&#8217;t have connectivity.  Servers go down.  Companies go out of business and without their servers, users would find themselves locked out of &#8220;their&#8221; software. The major forces keeping people from switching to a free operating system are hassle and compatibility.  But TPM can, on a practical level, negate both.  If Joe Average &#8211; who doesn&#8217;t give a flying crap about open source, DRM, TPM, or Richard M. Stallman &#8211; finds his programs don&#8217;t run when he needs them, he can&#8217;t play his music when he&#8217;s on the road, and he now has to provide credentials and pay a monthly fee to play Bejeweled, he is going to notice.  If Joe discovers there is an operating system that is free <em>and<\/em> it lets him work the way he used to (once he gets familiar with the new interface) he <em>will<\/em> switch. <\/p>\n<p>The personal computer and the internet both exploded because of the way they allowed users to easily create and share data.  Trying to take control of this at some higher level is like squeezing a handful of water.  People will switch to other systems not because irascible tinfoil-hat wearing grouches like me tell them they should, but because doing so gets them to their goal.   Looking at price, features, and convenience, they will choose whatever gets them back to their Power Point, Bejeweled, and Limp Bizcut. <\/p>\n<p>The control advocates have to play a very careful game.  They have to close the vice slowly, or users will abandon them.  And once someone is lost to an open source platform, they are going to be impossible to reclaim.  Their track record is not good with this sort of business, and as <a href=\"?tag=bioshock\">BioShock<\/a> showed us, even very straightforward activation systems can suffer from widespread failure.  Imagine hundreds of companies, all rolling out their own independent TPM  initiatives, their own rules, and their own ideas on what should be expected of the user before they&#8217;re allowed to use the software or access data.   It would probably be something between a debacle and a total clusterfarg.<\/p>\n<p>As ugly as this is, I submit that it is a waste of time writing to congress.  At the risk of dragging this into politics, this is the very body who gave us the DMCA, and are probably the most technologically inept segment of the population.  (They will no doubt turn to friends and &#8220;experts&#8221; for advice.  <a href=\"http:\/\/en.wikipedia.org\/wiki\/Mpaa\">Guess who<\/a> that will be?) Even if they listened to you, the odds of them taking any sort of useful action are astronomical.  Whatever they come up with could easily do more harm than good. I also suggest that it&#8217;s a waste of effort trying to make Joe Average care about this issue. Instead, the freedom advocates should probably focus on making sure the alternative (open source) is as welcoming as possible. Not because you care if Joe Average boots GNU\/Linux every morning, but because his defection would be so injurious to everyone on the control end of the spectrum. <\/p>\n<p>Great strides have already been made. <a href=\"http:\/\/www.ubuntu.com\/\">Ubuntu<\/a> is up to the job of letting the average user compute without worrying too much about the lower-level details of the operating system, and it gets better every year. (My wife has been using it for half a year now.  Last week we threw away the windows restore disks that came with her laptop. She&#8217;s <em>never<\/em> going back.) This may be the day the GNU\/Linux advocates have been waiting for:  The ascendancy of their platform. <\/p>\n<p>The next version of Windows will most likely be the one where they try to close the trap.  Things will be very interesting when we get to that point.<\/p>\n<div class=\"dmnotes\">Please do avoid the temptation to bring American politics into this.  If you fire a shot at one of your political foes, someone else will just volley it right back at you with something the opposite party has done, and this will implode into a debate over which party has the biggest jerks.  We&#8217;ve seen that thread before, and I could author both sides of that debate myself if I really wanted to see it.  Please don&#8217;t go there.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Earlier I linked to an article talking about the rise of the Trusted Platform Module. At first I thought it was just another doomed DRM scheme, but I have since been smacked in the head with the brick of enlightenment. Several people pointed out that not only is it not a joke, it&#8217;s already partly [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[30],"class_list":["post-1807","post","type-post","status-publish","format-standard","hentry","category-rants","tag-drm"],"_links":{"self":[{"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=\/wp\/v2\/posts\/1807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1807"}],"version-history":[{"count":0,"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=\/wp\/v2\/posts\/1807\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}