--
arc
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Personal page: http://www.chi3.org/arc
Chi3 Hacklab: http://www.chi3.org
Join the Fellowship: http://www.fsfe.org
NO EMAIL from Gmail, >1Mb, html, ms-office files
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
--- Begin Message ---
http://mail.fsfeurope.org/pipermail/discussion/2007-May/thread.html#6974
(read the thread, please)
I would have to send mail to fetch that, and anyway I don't have time
to read a lot of messages. (You don't know how overloaded I am.)
As you see, people is divided in two parts:
Simo and others say:
Thank you for summarizing the views. Now I can answer
without reading those messages.
"It's the use you make of a technology that can be good or bad, not the
technology itself.
That is true, literally -- but it has little significance in this issue.
In what sense is it true? Given that your machine has a TCPM, that
doesn't make it wrong for you to have the machine.
However, the development and production of computers with TCPMs is
part of a larger plan, and that plan also includes the use of these
TCPMs in proprietary operating systems to (1) restrict the users and
(2) make certain works and sites off limits to free software users.
Various companies are working together in that plan, which therefore
can accurately be called a conspiracy. The overall purpose of the
conspiracy is a power grab. All parts of the conspiracy deserve
the appropriate condemnation. And we need to fight this conspiracy
at all levels, because the harm it can do is very great.
That is the important thing to say about treacherous computing.
If it turns out that TCPMs can also be used for some legitimate and
acceptable purpose, that is a minor detail which doesn't alter
the important conclusions.
Can TC be used to enhance security if it's used with free software?
If you can do this without contributing to any tendency to legitimize
treacherous computing, then it is harmless. But you must MAKE SURE
you don't contribute to such a tendency. Don't leave it to chance!
Given the choice between (1) a world with no treacherous computing
hardware and (2) a world with treacherous computing hardware which we
can occasionally use for an innocent purpose, we need to strive to
achieve (1).
You can forward this message to the list if you want.
--- End Message ---
_______________________________________________
Discussion mailing list
[email protected]
https://mail.fsfeurope.org/mailman/listinfo/discussion