My understanding is that yes, you can uniquely identify a PC by it's
Trusted Computing Processor (or whatever the name of it is today).
They should be, but aren't today. I don't think this Trusted
Computing stuff is really going to change things much here, as you
mentioned the ethernet MAC address is already unique as far as 99.9%
of all users are concerned (yes, it can be changed, but virtually no
one does change it). Similarly you can get a serial number from your
hard drive to uniquely identify a PC, or you can go the Microsoft
route and get a sort of hash of all the hardware in the system.
The TCG stuff works in almost the exact same way as all of this, it
just automates things a tiny bit more, ie the application just
executes one bit of code specifically designed to get this information
rather than pulling it out of a variety of sources.
Note that this doesn't mean that web sites can secretly spy on you
because of this. As long as your browser isn't COMPLETELY broken
(read: as long as you are not running Internet Explorer with it's
enormous multitude of security holes) it's not possible to execute
arbitrary code like this just by viewing a web page. However if you
install an app on your system it could well read the TCG number and
report back to the app writer.
What really worries me about all this, is that your PC will possibly
become just a terminal to a MS authentication server (or the States
or whatever regulating authority), where they will be able to deny
even net-access if you do not run THEIR software and hardware.
OR, force you to upgrade.
Something like customer binding.. but then with a big lead ball on your
foot.
Absolutely these systems should NOT be part of a processor, and given a
choice I would buy from the competition.
Not only that, it is technically very possible to have some logic in
the mobo chipset that stores keyboard strokes, and sends these over the
net upon request to some NSA(for example) URL.
With only 2 processor manufacturers and just a few chipset makers, this
is a real danger.
It would become a real disaster if the system was hacked, as every bodies
secrets would be out.
We should really do whatever we can both technically and politically to
avoid such a system becoming a reality.
I do not want to give up my computing to some big corporation, MS, or a
state controlled by it.
I do not want to see Linux killed by it (and that included IBM too) by
having a system that lets only 'authenticated' PCs connect to the net.
the servers will of cause be the next target from that group, and once
they get their hands on the servers, or routers even, they can do what
they want.
IF laws need making, let us start giving food to the lawyers by having them
look at protection of free Internet traffic, independent of system, country,
OS, and everything else.
JP