A GPU could use a TPM to "activate" the "credential" to extract a symmetric session key and then do all the bulk decryption in the GPU. This does not invalidate your argument that the FSF is focusing on the wrong target though because the GPU vendors could just implement the TPM-like protocols in the GPU anyways.
Power management, mobile and firmware developer on Linux. Security developer at Aurora. Ex-biologist. mjg59 on Twitter. Content here should not be interpreted as the opinion of my employer. Also on Mastodon.
no subject
Date: 2025-01-02 06:07 am (UTC)https://news.ycombinator.com/item?id=42572090