"It can't limit what you do [...]. It needs non-free software to do
that." 
This is not true
    http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
    http://www.eema.org/downloads/security_articles/trusted_computing.pdf
    http://www.schneier.com/blog/archives/2005/08/trusted_computi.html
    http://www.schneier.com/crypto-gram-0208.html#1
    
TC can control everything.

   http://www.trustedcomputinggroup.org/trusted_computing

This is not theory but reality 

    http://www.wired.com/gadgets/mac/commentary/cultofmac/2005/08/68501
    http://news.cnet.com/2100-1016_3-5819211.html
    http://cyberlaw.stanford.edu/blogs/bechtold/archives003235.shtml

Also this "[...] TPMs that we know we control." is false because when
will be available only trusted system? 

http://www.trustedcomputinggroup.org/solutions/network_security

It is naive to use the TC for good benefits, because they are born for 
to violate our security and slowly in silence the hardware and software
vendors are filling the world of trusted systems

[6] http://www.msnbc.msn.com/ID/10441443
    http://www.chillingeffects.org/weather.cgi?WeatherID=534
_______________________________________________
linux-libre mailing list
[email protected]
http://www.fsfla.org/cgi-bin/mailman/listinfo/linux-libre

Reply via email to