[Freedombox-discuss] PSN, ARM's Trust Zone and TPM
-----BEGIN PGP SIGNED MESSAGE-----
On June 27, 2012, Ben the Pyrate asked:
I'm a little confused about all this concern I've been seeing
about UUIDs. Could someone explain this to me? How exactly does it
hurt your privacy/anonymity if your CPU has a UUID?
Or, asked another way, what is the attack vector? What would a
hacker or government or other adversary need to do in order to
track someone by their UUID? Please help me to understand this
Ben the Pyrate
In 1999, Intel announced that its Pentium III processors have a
processor serial number (PSN). Whereas, Intel had concealed that
its earlier processor, the Pentium II had a PSN. See:
/ and http://bigbrotherinside.org/ and
Intel installed a PSN for digital rights management. I will discuss
digital rights management under my paragraph on Trusted Platform
"It (PSN) allows software manufacturers and websites to identify
individuals more precisely." From:
"But what I thought was the most interesting was that the processor
serial number still gets reported to the Windows operating system."
"Pentium III's serial number could be read by external programs."
Privacy groups protested against the PSN's invasion of privacy. The
EU and China intended to ban Pentium III. See
Therefore, Intel developed software that would disable the PSN for
users who's BIOS did not give an option to disable PSN. Disabling
means that the PSN would not be visible online. Whereas, the BIOS
option and Intel's software did not work. The PSN leaked and was
visible online. See: http://articles.cnn.com/keyword/pentium-iii
The PSN also leaked because malware hacked Intel's disabling. Intel
asked Symantec for a patch. The patch did not work.
Intel's misrepresented that it would discontinue inserting PSN and
in its place use TPM (Trusted Platform Module). Whereas, Intel
continued to insert PSN in its next processor, the Pentium 4. See
TPM's invasion of privacy is discussed at
http://www.gnu.org/philosophy/can-you-trust.html and see section on
How can TC be abused? at http://www.cl.cam.ac.uk/~rja14/tcpa-
TPM is a 1 GB microchip on the motherboard. TPM is not in the
processor. TPM has an universally unique identifier (UUID). In
addition to its own visible UUID, TPM creates a composite UUID
containing the serial numbers of other hardware such as the
internal hard drive. Websites, government, IT administrators and
hackers can see these UUIDs.
For example, if a consumer purchases an e-book or software and
changes his or her internal hard drive or copies it onto another
computer, the e-book will not play.
Government, hackers and information brokers can track the activity
and geolocation of computers by their UUIDs. Websites that read the
UUIDs can sell this tracking information along with other tracking
information to information brokers who resell it to investigators
who resell it to abusers.
There is more than version of TPM. "Meanwhile, there are spin-offs
and enhancements whose security characteristics were embedded even
more strictly. Examples are Intel's LaGrande Technology, ARM's
TrustZone, and starting in 2006, AMD's Presidio is expected to hit
Besides being tracked by use of a credit card, consumers can be
tracked by the UUID when they do online banking.
Secured PIN entry for enhanced user authentication in mobile
payments & banking
? Anti-malware that is protected from software attack
? Digital Right Management
? Software license management
? Loyalty-based applications
? Access control of cloud-based documents
? e-Ticketing Mobile TV
Marvell uses ARM processors. ARM processors supporting TrustZone
include: ARM Cortex-A15, ARM Cortex-A9, ARM Cortex-A8, ARM Cortex-
A7, ARM Cortex-A5 and ARM1176. I could not tell by reviewing
Marvell's website which ARM the Kirkwood 88F6281 or the Sheva
processor in DreamPlug has. Could you please ask Marvell?
Hackers had it easy when one OS dominated the world. One article
discussed that hackers are performing less software attacks and
instead attacking processors. Hacking the processor at the kernel
level gives complete remote control of the computer. A PSN makes
the processor visible online. A PSN makes the processor vulnerable
Firmware rootkits that infect the BIOS are not always erased by
flashing the BIOS. See articles on the mebromi firmware rootkit.
A mesh network and OpenVPN and proxies, such as TOR, do not fully
grant privacy. The PSN and/or TPM's UUID are visible offline. I
cannot cite references on this. I have been hacked offline, first
by my wifi card and after I removed my wifi card and bluetooth
card, by my PSN. Yes, computers can be hacked via their wifi cards
even though the computers are offline. See
There are plenty of articles on hacking bluetooth due to
bluetooth's MAC address being visible.
The old methods of tracking computers were IP address and MAC
address of the wifi card. If this were completely sufficient, there
would be no reason for PSN and TPM. The fact that they exist means
that they enable tracking of computers via hardware.
Don't give a false sense of security by promising privacy unless
you are also offering hardware privacy. Except for MAC address on
wifi cards, we had hardware privacy prior to Pentium II's PSN.
FreedomBox can ask Marvell and/or other manufacturer to "down
grade" to the early 1990s and give us back our hardware privacy.
-----BEGIN PGP SIGNATURE-----
Version: Hush 3.0
Note: This signature can be verified at https://www.hushtools.com/verify
-----END PGP SIGNATURE-----