"It can't limit what you do [...]. It needs non-free software to do
that."
This is not true
http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
http://www.eema.org/downloads/security_articles/trusted_computing.pdf
http://www.schneier.com/blog/archives/2005/08/trusted_computi.html
http://www.schneier.com/crypto-gram-0208.html#1
TC can control everything.http://www.trustedcomputinggroup.org/trusted_computing This is not theory but reality http://www.wired.com/gadgets/mac/commentary/cultofmac/2005/08/68501 http://news.cnet.com/2100-1016_3-5819211.html http://cyberlaw.stanford.edu/blogs/bechtold/archives003235.shtml Also this "[...] TPMs that we know we control." is false because when will be available only trusted system? http://www.trustedcomputinggroup.org/solutions/network_security It is naive to use the TC for good benefits, because they are born for to violate our security and slowly in silence the hardware and software vendors are filling the world of trusted systems [6] http://www.msnbc.msn.com/ID/10441443 http://www.chillingeffects.org/weather.cgi?WeatherID=534 _______________________________________________ linux-libre mailing list [email protected] http://www.fsfla.org/cgi-bin/mailman/listinfo/linux-libre
