munky Posted October 8, 2007 Share Posted October 8, 2007 http://www.osxbook.com/book/bonus/chapter10/tpm/ For anyone who still beleives this myth. Link to comment Share on other sites More sharing options...
lord_muad_dib Posted October 8, 2007 Share Posted October 8, 2007 old news, but is good to be remembered Link to comment Share on other sites More sharing options...
mifki Posted October 9, 2007 Share Posted October 9, 2007 Its news to most users on this forum who claim that os x wont work because of tpm, and that the kernel is hacked to remove tpm support and other rubbish like that. Thanks munky, maybe you could sticky it in the osx86/ homebrew section? Link to comment Share on other sites More sharing options...
U.C. Posted October 9, 2007 Share Posted October 9, 2007 What!!! You fakers, Maxxus, Semthex and all of you claiming to have hacked the kernel and what not. Not Really. I had read this before, while doing research, but I didnot really believe it. Link to comment Share on other sites More sharing options...
mifki Posted October 10, 2007 Share Posted October 10, 2007 Its true, the only thing needed to hack a kernel for a core 2 duo system is remove efi (about 1 or 2 nops) and hardcode the fsb (another 1 or 2 nops) Link to comment Share on other sites More sharing options...
Cyman Posted October 13, 2007 Share Posted October 13, 2007 Maybe the final version will feature TPM. I still believe that Apple has a surprise for all the OSX86 users. If I am right, we'll see how long it takes until hackers can bypass Apple's measures to prevent Leopard from installing on non-Apple hardware... Link to comment Share on other sites More sharing options...
mifki Posted October 13, 2007 Share Posted October 13, 2007 no it wont, the newer macs have no tpm chip. tiger hasnt used it ever. leopard has never used it. And never will Link to comment Share on other sites More sharing options...
Hagar Posted October 14, 2007 Share Posted October 14, 2007 so what were the issues with appletpmacpi.kext in 10.4.1 all about, then? Link to comment Share on other sites More sharing options...
mifki Posted October 15, 2007 Share Posted October 15, 2007 it checked to see if the hardware was there iirc, considering 10.4.1 was only intended for the DTK machines, and considering it was just a standard 915 board, apple had to introduce at least some checks, but no cryptography was being done through the TPM chip, just a check (i may be wrong, as i havent had much hands on with 10.4.1) Also, 10.4.1 was internal Beta, whereas the later builds 10.4.4 etc were released into the public with real macs Link to comment Share on other sites More sharing options...
Dr. Hurt Posted November 1, 2007 Share Posted November 1, 2007 Then what is the function of decrypts, rXdX and all that stuff? Link to comment Share on other sites More sharing options...
munky Posted November 15, 2007 Author Share Posted November 15, 2007 OSX binaries are encrypted, but not using the TPM. Link to comment Share on other sites More sharing options...
frizbot Posted December 30, 2007 Share Posted December 30, 2007 Supposedly there may be this to contend with as well- http://www.macrumors.com/2007/12/20/apple-...ghting-patents/ "The other filing, patent application #20070288886, deals with attempts to fight software piracy. A digital rights management system permits an application owner to cause code to be injected into the application's run-time instruction stream so as to restrict execution of that application to specific hardware platforms. In a first phase, an authorizing entity (e.g., an application owner or platform manufacturer) authorizes one or more applications to execute on a given hardware platform. Later, during application run-time, code is injected that performs periodic checks are made to determine if the application continues to run on the previously authorized hardware platform. If a periodic check fails, at least part of the application's execution string is terminated--effectively rendering the application non-usable. The periodic check is transparent to the user and difficult to circumvent. " Their link doesn't work for me. Link to comment Share on other sites More sharing options...
rossby Posted November 18, 2008 Share Posted November 18, 2008 http://www.osxbook.com/book/bonus/chapter10/tpm/ For anyone who still beleives this myth. Did OS X use the TPM at one time to prevent the OS from loading? Link to comment Share on other sites More sharing options...
Hagar Posted November 18, 2008 Share Posted November 18, 2008 I believe the original intel developer transition kit that ran 10.4.1 - 10.4.3 (before the launch of the real intel macs) checked for the presence of a TPM. Link to comment Share on other sites More sharing options...
hecker Posted November 18, 2008 Share Posted November 18, 2008 I actually didn't know this for sure. But it's nice. Makes me feel all warm and fuzzy inside. Link to comment Share on other sites More sharing options...
bofors Posted November 20, 2008 Share Posted November 20, 2008 I believe the original intel developer transition kit that ran 10.4.1 - 10.4.3 (before the launch of the real intel macs) checked for the presence of a TPM. This is what I remember as well. Link to comment Share on other sites More sharing options...
thx4dat Posted March 30, 2009 Share Posted March 30, 2009 Maybe the final version will feature TPM. I still believe that Apple has a surprise for all the OSX86 users. If I am right, we'll see how long it takes until hackers can bypass Apple's measures to prevent Leopard from installing on non-Apple hardware... maybe ApL pays people to lurk in this awesome forum taking notes from all the smart people, only to run back and tell their team leader at headquarters (in hopes of some bonus, or promotion, like maybe free jelly donuts in the cafeteria or some energy drink)what the evil OSx86 are doing ..... er ..... Seriously, the creators of the keystone components of doze and Apple, DOS and BSD, did they get anything? Even credit? I imagine this: a handfull of bright students working for fun, and maybe some school credit developing, naively smiling, then putting their work in the hand of their proud professor, who looks upon them with fatherly favor, while in his other hand he hands the intellectual material to the highest bidder, who then slaps a copyright on it and calls it theirs. Sorry I got carried away, I started out wanting to say that I don't know how a corp can claim ownership to something that they didn't make originally. And then not have some sort of co-operation with the community of users. Or, maybe I am wrong and there are cooperations on some level. I don't know I am not an insider. Or maybe "successful rich" people are just cleaver thieves that steal from the people who are to busy actually doing something to realize that they are being stollen from. Link to comment Share on other sites More sharing options...
Recommended Posts