> Yes, Trusted Computing is used for DRM Don't despair, back doors are currentyl being considered:
http://news.bbc.co.uk/1/hi/uk_politics/4713018.stm Ross Anderson remarks: "I’m in favour of court-mandated shortcuts past rights-management systems, on competition-policy grounds. In our APIG submission I wrote ‘In cases of abuse, judges must be able to order rights-management mechanisms unlocked’. I don’t see the Vista security mechanisms as being security for me, but as security for them. It’s just not the same as the key escrow debates of the 1990s - in which I opposed key escrow on principle. The technology’s being used for different things here. If you want privacy, use PGP - or better still, some low-observable communication technology, such as throwaway prepaid mobile phones or webmail accounts Ross" (Found in the comments at http://www.lightbluetouchpaper.org/2006/02/13/forensics-and-terrorism/#comments) - Klaus _______________________________________________ http://www.mccmedia.com/mailman/listinfo/brin-l
