World Library  
Flag as Inappropriate
Email this Article

Hardware restriction

Article Id: WHEBN0025707734
Reproduction Date:

Title: Hardware restriction  
Author: World Heritage Encyclopedia
Language: English
Subject: Digital rights management, IOS jailbreaking, Proprietary hardware, Hardware restrictions, IOS (Apple)
Collection: Digital Rights Management, Hardware Restrictions, Ios (Apple), Ios Jailbreaking, Proprietary Hardware
Publisher: World Heritage Encyclopedia

Hardware restriction

A hardware restriction (sometimes called hardware DRM)[1] is content protection enforced by electronic components. The hardware restriction scheme may complement a digital rights management system implemented in software. Some examples of hardware restriction information appliances are video game consoles, smart phones,[2] tablet computers, Macintosh computers[3] and personal computers that implement secure boot.


  • Instances of hardware restriction 1
    • Upgradeable processors 1.1
    • Intel Insider 1.2
    • Verified/trusted/secure boot 1.3
    • Android devices 1.4
    • Apple devices 1.5
    • TiVo 1.6
    • OLPC 1.7
    • Secure boot 1.8
    • Solaris Verified Boot 1.9
  • See also 2
  • References 3
  • External links 4

Instances of hardware restriction

Upgradeable processors

Some Intel processors are sold with some features "locked", that can later be unlocked after payment.[4][5]

Note that this is not unique to Intel. Some models of IBM's System 370 mainframe computer had additional hardware included, that if the customer paid the additional charge, IBM would send out a service engineer to enable it, typically by cutting a resistor in the machine.

Intel Insider

Intel Insider, a technology that provides a "protected path" for digital content,[6] can be considered a form of DRM.[7][8][9]

Verified/trusted/secure boot

Some devices implement a feature called "verified boot", "trusted boot" or "secure boot", which will only allow signed software to run on the device, usually from the device manufacturer. This is considered a restriction unless users either have the ability to disable it or have the ability to sign the software.

Android devices

Some Android devices (with the notable exception of "official line", the Nexus series) come with the bootloader locked.

Apple devices

Apple's iOS devices (iPhone, iPad, iPod touch, and Apple TV) require signatures for firmware installation, intended to verify that only the latest official firmware can be installed on those devices. Official firmware allows third-party software to be installed only from the App Store.


If a device only runs software approved by the hardware vendor, and only a certain version of a free software program is allowed to run on the device, the user cannot exercise the rights he theoretically has, because he cannot install modified versions.


Another case of trusted boot is the developer key" unique to that laptop, over the Internet, waiting 24 hours to receive it, installing it, and running the firmware command "disable-security". However some deployments such as Uruguay[10] deny requests for such keys. The stated goal is to deter mass theft of laptops from children or via distribution channels, by making the laptops refuse to boot, making it hard to reprogram them so they will boot and delaying the issuance of developer keys to allow time to check whether a key-requesting laptop had been stolen.

Secure boot

(dead link)

Certified Windows 8 hardware will require secure boot. Soon after the feature was announced, September 2011, it caused widespread fear it would lock-out alternative operating systems.[11][12][13][14] In January 2012, Microsoft confirmed it would require hardware manufacturers to enable secure boot on Windows 8 devices, and that x86/64 devices must provide the option to turn it off while ARM-based devices must not provide the option to turn it off.[15] According to Glyn Moody, at ComputerWorld, this "approach seems to be making it hard if not impossible to install GNU/Linux on hardware systems certified for Windows 8".[15]

Solaris Verified Boot

Oracle Solaris 11.2 has a Verified Boot feature checks the signatures of the boot block and kernel modules. By default it is disabled. If enabled, it can be set to "warning" mode where only a warning message is logged on signature failures or to "enforce" mode where the module is not loaded. The Solaris elfsign(1) command inserts a signature into kernel modules. All kernel modules distributed by Oracle has a signature. Third-party kernel modules are allowed, providing the public key certificate is installed in firmware (to establish a root of trust).[16]

See also


  1. ^ HP Laboratories
  2. ^ Want an iPhone? Beware the iHandcuffs - New York Times
  3. ^ [1]Apple brings HDCP to a new aluminum MacBook
  4. ^ Intel wants to charge $50 to unlock stuff your CPU can already do - Engadget
  5. ^ Intel + DRM: a crippled processor that you have to pay extra to unlock - Boing Boing
  6. ^ Intel: Sandy Bridge's Insider is not DRM - Computerworld
  7. ^ Intel Claims DRM'd Chip Is Not DRM, It's Just Copy Protection | Techdirt
  8. ^ Is Intel Insider Code for DRM in Sandy Bridge? |
  9. ^ Intel's Sandy Bridge sucks up to Hollywood with DRM - The Inquirer
  10. ^
  11. ^
  12. ^ Windows 8 secure boot could complicate Linux installs
  13. ^ Windows 8 secure boot to block Linux - Hardware - News - ZDNet Australia
  14. ^
  15. ^ a b Is Microsoft Blocking Linux Booting on ARM Hardware? - Open Enterprise
  16. ^ Solaris Verified Boot

External links

  • An Introduction to Tivoization by The Linux Information Project (LINFO)
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.