23C3 - 1.5

23rd Chaos Communication Congress
Who can you trust?

Speakers
Amit Singh
Schedule
Day 3
Room Saal 1
Start time 12:45
Duration 01:00
Info
ID 1721
Event type Lecture
Track Hacking
Language English
Feedback

Software Protection and the TPM

The Mac OS X Story

Ever since Apple announced the x86 version of Mac OS X, people have been obsessed with running the operating system on non-Apple hardware. The media has given this topic more than its fair share of coverage, with nary a week going by without some discussion of the tussle between Apple and system attackers attempting to "crack" Mac OS X.

Regardless of the periodic outcomes of such tussles (including the so-called hacker victories), widespread myths continue about what happens inside Mac OS X with respect to such protection. Moreover, the presence of trusted platform modules (TPMs) in newer Apple computer models only makes the situation more interesting--trusted hardware is perhaps one of the most untrusted (and misunderstood) entities on earth. In this talk, we will unravel some TPM mysteries and look at the architecture of Mac OS X relevant to software protection.