- Trusted client
In
computing , a trusted client is a device or program controlled by the user of a service, but with restrictions designed to prevent its use in ways not authorised by the provider of the service. That is, the client is a device that vendors trust and then sell to the consumers, whom they do not trust. Examples includevideo game s played over acomputer network or thecontent-scrambling system (CSS) inDVD s.Trusted client software is considered fundamentally insecure: once the security is broken by one user, the break is trivially copiable and available to others. As computer security specialist
Bruce Schneier states, "Against the average user, anything works; there's no need for complex security software. Against the skilled attacker, on the other hand, nothing works." [citation|author=Bruce Schneier |url=http://www.schneier.com/essay-063.html|title=The Fallacy of Trusted Client Software|journal=Information Security Magazine|date=August 2000|accessdate=2008-01-30] Trusted client hardware is somewhat less insecure, but not a complete solution [cite conference
first = Joe
last = Grand
authorlink =
coauthors =
title = Attacks and Countermeasures for USB Hardware Token Devices
booktitle = Proceedings of the Fifth Nordic Workshop on Secure IT Systems Encouraging Co-operation
pages = pp 35-57
publisher = Grand Ideas Studio
date = 2000-10-12 - 2000-10-13
location = Reykjavik, Iceland
url = http://www.grandideastudio.com/files/security/tokens/usb_hardware_token.pdf
doi =
id = ISBN 9979-9483-0-2
accessdate = 2006-08-25] .Trusted clients are attractive to business as a form of
vendor lock-in : sell the trusted client at a loss and charge more than would be otherwise economically viable for the associated service. One early example wasradio receivers that were subsidised by broadcasters, but restricted to receiving only their radio station. Modern examples includevideo recorder s being forced by law to includeMacrovision copy protection, theDVD region code system and region-codedvideo game console s.Technically knowledgeable consumers and other manufacturers frequently bypass the limiting features of trusted clients — from the simple replacement of the fixed tuning
capacitor in the early locked radios to the successfulDeCSS cryptographic attack on CSS in1999 . Manufacturers have resorted to legal threats via theDigital Millennium Copyright Act and similar laws to prevent their circumvention, with varying degrees of success.Trusted computing aims to createcomputer hardware which assists in the implementation of such restrictions incomputer software , and attempts to make circumvention of these restrictions more difficult.ee also
* Trust
*Dongle
*Secure cryptoprocessor References
Wikimedia Foundation. 2010.