{"id":337,"date":"2005-02-28T16:49:18","date_gmt":"2005-02-28T20:49:18","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/benadida\/2005\/02\/28\/ipod-shuffle-as-a-trusted-device\/"},"modified":"2005-02-28T16:49:18","modified_gmt":"2005-02-28T20:49:18","slug":"ipod-shuffle-as-a-trusted-device","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/ben\/2005\/02\/28\/ipod-shuffle-as-a-trusted-device\/","title":{"rendered":"iPod Shuffle as a Trusted Device?"},"content":{"rendered":"<p><a name='a219'><\/a><\/p>\n<p>My sister just got me an iPod Shuffle for my birthday, which is really nice. I&#8217;m surprised by how light and convenient it is. For all of those people who are worried about using an ipod for working out, this is your solution.<\/p>\n<p>But it got me thinking. If this iPod does on-the-fly decryption of DRM&#8217;ed songs like other iPods, then it&#8217;s got enough computing power to perform AES encryption. It&#8217;s got its own input mechanism (those buttons). Of course, it has no display, but maybe that&#8217;s not immediately necessary.<\/p>\n<p>How about storing your private key on your iPod Shuffle, where the key is unlocked by a secret sequence of button presses? This may be the tiniest and cheapest secure storage device out there. 512 megs of secure storage with trusted inputs. I wonder how difficult it would be to write new firmware for this functionality&#8230;.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>My sister just got me an iPod Shuffle for my birthday, which is really nice. I&#8217;m surprised by how light and convenient it is. For all of those people who are worried about using an ipod for working out, this is your solution. But it got me thinking. If this iPod does on-the-fly decryption of [&hellip;]<\/p>\n","protected":false},"author":93,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[129],"tags":[],"class_list":["post-337","post","type-post","status-publish","format-standard","hentry","category-security-crypto"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/ben\/wp-json\/wp\/v2\/posts\/337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/ben\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/ben\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/ben\/wp-json\/wp\/v2\/users\/93"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/ben\/wp-json\/wp\/v2\/comments?post=337"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/ben\/wp-json\/wp\/v2\/posts\/337\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/ben\/wp-json\/wp\/v2\/media?parent=337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/ben\/wp-json\/wp\/v2\/categories?post=337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/ben\/wp-json\/wp\/v2\/tags?post=337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}