January 22, 2004

Trusted Computing: Scam 101

Against TCPA | TCPA would TAKE your FREEDOM | This is NO FAKE

Some article quotes, just to get you going:

TC provides a computing platform on which you can't tamper with the application software, and where these applications can communicate securely with their authors and with each other.

TC will also make it much harder for you to run unlicensed software. In the first version of TC, pirate software could be detected and deleted remotely.

TC can also implement fancier controls: for example, if you send an email that causes embarrassment to your boss, he can broadcast a cancellation message that will cause it to be deleted wherever it's got to.

The second, and most important, benefit for Microsoft is that TC will dramatically increase the costs of switching away from Microsoft products (such as Office) to rival products (such as OpenOffice).

First, some well-intentioned police force will get an order against a pornographic picture of a child, or a manual on how to sabotage railroad signals. All TC-compliant PCs will delete, or perhaps report, these bad documents. Then a litigant in a libel or copyright case will get a civil court order against an offending document; perhaps the Scientologists will seek to blacklist the famous Fishman Affidavit. A dictator's secret police could punish the author of a dissident leaflet by deleting everything she ever created using that system - her new book, her tax return, even her kids' birthday cards - wherever it had ended up. In the West, a court might use confiscation doctrine to `blackhole' a machine that had been used to make a pornographic picture of a child. Once lawyers, policemen and judges realise the potential, the trickle will become a flood.

Posted by answerguru at January 22, 2004 08:09 AM | TrackBack
Comments
Post a comment