Feeds

Microsoft reveals hardware security plans

Concerns remain

  • alert
  • submit to reddit

Boost IT visibility and business value

Can trusted computing hardware deliver security without locking out competition, asks SecurityFocus's Robert Lemos.

The next version of Windows, codenamed "Longhorn," will have security features to take advantage of the trusted computing hardware now showing up in the marketplace, Microsoft executives announced on Monday.

The software giant plans to deliver encryption features and integrity checks to insure that computers, such as notebooks, that are disconnected from a network are not affected by malicious programs. Called Secure Startup, the feature will appear in Microsoft's forthcoming version of its operating system, known as Longhorn, and represents a much smaller subset of the security features that the software giant had originally intended to build into the system software.

"We remain fully committed to the vision of creating new security technology for the Microsoft Windows platform that uses a unique hardware and software design to give users new kinds of security and privacy protections in an interconnected world," Selena Wilson, director of product marketing for Microsoft's Security Business and Technology Unit, said in statement. "The changes we are making can be characterized as an evolution of that original vision."

Secure Startup will combine full-volume encryption, integrity checks and the hardware-based Trusted Platform Module (TPM) to detect malicious changes to the computer and protect the user's data if the laptop is stolen, the software giant stated at its annual Windows Hardware Engineering Conference (WinHEC). The Trusted Platform Module is a standards-based hardware design created by the Trusted Computing Group, of which Microsoft is a member. (SecurityFocus's parent company, Symantec, is a contributing member of the group.)

While the technologies, once known as Palladium and now called the next-generation secure computing base (NGSCB), will help companies and consumers lock down their computers and networks, concerns remain that the hardware security measures could also be used to lock-in consumers to a single platform and restrict fair uses of content.

With homegrown integrity and security features being added by a variety of devices by companies aiming to lock out competition using the Digital Millennium Copyright Act (DMCA), the specter of another hardware-based security feature worries some information-system experts.

Innovation could suffer if reverse engineers are locked out from tinkering with devices, said Dan Lockton, a graduate student at the University of Cambridge whose thesis focuses on the effects of technologies created for controlling information.

The fear is that "we're moving to a stage where the customer no longer has control over the product he or she has bought or the products (created) using that device," Lockton said.

Printer maker Lexmark attempted to block generic ink cartridge makers from reverse engineering its simple hardware security scheme for validating legitimate cartridges. A federal appeals court overturned in October an initial win for Lexmark and allowed chip-maker Static Control to continue making the chips that made generic ink cartridges compatible with Lexmark printers.

"It is definitely clear that some of the content owners themselves are trying to use the technology to erode some of the fair use allowances that have historically been granted by the courts," said William Arbaugh, assistant professor of computer science for the University of Maryland at College Park. "We have to be vigilant in order to stop that tactic."

The Electronic Frontier Foundation, an Information Age civil rights group, has also criticized the technology as potentially undermining fair use rights.

However, Microsoft's Wilson stressed that the software giant intends to increase user security, not reduce the control the user has over their computer.

"We have always been very clear that NGSCB was never designed to be a system that would 'lock-in' users or decrease the flexibility of the Windows computing experience," she said. "Our vision has always been to provide benefits in terms of security, privacy, and system integrity while preserving the flexibility of Windows."

If Microsoft - and more importantly, third-party content providers - give consumers full control over how the technology is used in their systems, the security benefits could significantly increase the protection of PC data, the University of Maryland's Arbaugh said.

"This technology could be used for some really heavy handed digital-rights management (DRM) but it can also be used for some great improvements in security," he said. "I think finding that sweet spot will be a technical challenge as well as a policy challenge."

Copyright © 2005, SecurityFocus logo

Boost IT visibility and business value

More from The Register

next story
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Microsoft refuses to nip 'Windows 9' unzip lip slip
Look at the shiny Windows 8.1, why can't you people talk about 8.1, sobs an exec somewhere
Intel's Raspberry Pi rival Galileo can now run Windows
Behold the Internet of Things. Wintel Things
Linux Foundation says many Linux admins and engineers are certifiable
Floats exam program to help IT employers lock up talent
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
Linux kernel devs made to finger their dongles before contributing code
Two-factor auth enabled for Kernel.org repositories
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?