> Yes, Trusted Computing is used for DRM

Don't despair, back doors are currentyl being considered:

http://news.bbc.co.uk/1/hi/uk_politics/4713018.stm

Ross Anderson remarks:

  "I’m in favour of court-mandated shortcuts past rights-management systems,
on competition-policy grounds. In our APIG submission I wrote ‘In cases of
abuse, judges must be able to order rights-management mechanisms unlocked’.

  I don’t see the Vista security mechanisms as being security for me, but as
security for them. It’s just not the same as the key escrow debates of the
1990s - in which I opposed key escrow on principle. The technology’s being
used for different things here.

  If you want privacy, use PGP - or better still, some low-observable
communication technology, such as throwaway prepaid mobile phones or webmail
accounts

  Ross"


(Found in the comments at
http://www.lightbluetouchpaper.org/2006/02/13/forensics-and-terrorism/#comments)

- Klaus

_______________________________________________
http://www.mccmedia.com/mailman/listinfo/brin-l

Reply via email to