zlacker

[parent] [thread] 0 comments
1. dane-p+(OP)[view] [source] 2022-01-09 19:51:15
> How can ISPs do anything close to this when they're not even concerned with how many devices you have?

Unfortunately that's not guaranteed to always be the case. The "Trusted Computer Group" already have ways for network operators to answer "Who and what’s on my network?"[0], and it's possible to set up an IPsec VPN between your device and the ISP where the key is only known to the TPM on your device.[1]

Of course the user could try to proxy requests from an "untrusted" machine to a "trusted" one, and piggyback the connection, but I imagine that applications which allow this won't be allowed in "secure" app stores, and "secure" operating systems would in any case firewall off packets coming from "untrusted" machines in the first place.

[0] https://trustedcomputinggroup.org/work-groups/trusted-networ...

[1] https://wiki.strongswan.org/projects/strongswan/wiki/Trusted...

[go to top]