More on Apple and non-portability

| Comments (1) | TrackBacks (14) |
One thing that's worth noting about restricting people from running OS/X on generic PC hardware is that trusted computing technology is of fairly little use. It's certainly easy enough to arrange for a trusted computing module in all legitimate Apple computers but that doesn't buy you much, since it just amounts to the OS checking for the TC module, which is little better than serial number checks. The other alternative is to require part of the code to run in the TC module, perhaps by encrypting that section of code. However, then the attacker just reverse engineers that interface and replaces that section of the code. You could, of course, make the whole thing run in that kind of trusted hardware, but this isn't compatible with the general design of such systems which is to mate a general purpose CPU with small trusted computing base.

14 TrackBacks

Listed below are links to blogs that reference this entry: More on Apple and non-portability.

TrackBack URL for this entry:

online black jack from online black jack on July 17, 2005 12:31 PM

You can also visit some information dedicated to slot machines casino games Read More

gmac mortgage from gmac mortgage on July 21, 2005 5:43 PM

You are invited to take a look at some helpful info on credit card processing free porn no credit card Read More

lexmark 18c0031 refill kit lexmark x125 manual how to uninstall lexmark lexmark 1150 printer low cost lexmark multifunction printers lexmark p315 reviews power supply for lexmark x1185 lexmark z54se inkjet printer ratings lexmark ink jet cartridge 62 ... Read More

ephedra based weight loss drug from ephedra based weight loss drug on August 28, 2005 9:48 PM

You may find it interesting to visit some information dedicated to weight loss drugs addiction Read More

TITLE: texas holdem URL: IP: BLOG NAME: texas holdem DATE: 09/20/2005 09:11:01 PM Read More

You may find it interesting to take a look at the pages dedicated to viagra Read More

motorola ringtones from motorola ringtones on October 3, 2005 11:27 AM

motorola ringtones For it was the Class-characters who had volviose of the churches at Edusa, and the printe Read More

Gyno sexporno from Lesbian sex pics from russia on December 24, 2005 9:51 AM

Horse fucking indian pictures Scat movies downloads Hindi movies nude Women rape in iraq Read More

Womens erotic movies from Japan av download vcd on December 26, 2005 3:17 AM

Extreme sex nurse Download cinema movies for free Gratis tentacle hentai Doctors bondage pictures free Read More

hoodia from pure hoodia on January 4, 2006 12:57 AM

TITLE: hoodia URL: IP: BLOG NAME: pure hoodia DATE: 01/04/2006 12:57:19 AM Read More

TITLE: cubic zirconia URL: IP: BLOG NAME: cz jewelry DATE: 01/10/2006 04:34:13 AM Read More

When you use us to write and send a press release for you about play poker, you are guaranteed that it will be published. Thank you for your interest in play poker. To see the play poker col... Read More


If you have to bypass TC, Apple might have the DMCA on their side and can keep things under the carpet. If they are smart, they don't care what people do in their basements, and only go after those who are stupid to post their findings to the Internet.

There's a small problem, though: VMware. VMware clearly has substantial noninfringing use, and I'm sure VMware will support Mac OS X/x86 as both a host and a guest system. How would you convince VMware to run MacOS X guests only on MacOS-X-capable hosts?

Leave a comment