On Sat, May 06, 2006 at 05:42:09AM -0600, Charles Curley wrote:
>       Schneier on Security
> 
>       A weblog covering security and security technology.
> 
>       May 04, 2006
>       Who Owns Your Computer?
> 
>       When technology serves its owners, it is liberating. When it is
>       designed to serve others, over the owner's objection, it is
>       oppressive. There's a battle raging on your computer right now --
>       one that pits you against worms and viruses, Trojans, spyware,
>       automatic update features and digital rights management
>       technologies. It's the battle to determine who owns your computer.
> 
>       You own your computer, of course. You bought it. You paid for
>       it. But how much control do you really have over what happens on
>       your machine? Technically you might have bought the hardware and
>       software, but you have less control over what it's doing behind
>       the scenes.
> 
> http://www.schneier.com/blog/archives/2006/05/who_owns_your_c.html

A co-worker of mine who developed TrouSerS (the OSS TPM library)
pointed out that equating ``Trusted Computing'' with ``Palladium,'' as
Schneier did in this article by making the term ``Trusted Computing''
link to an article on Palladium, followed immediately by a comment
about technology that tries to own people's computers. This detracts
from the legitimate (non-DRM) uses of hardware-assisted key
management.

Schneier should know better.

Mike

(My comments here reflect only my own opinions.)

Attachment: signature.asc
Description: Digital signature

/*
PLUG: http://plug.org, #utah on irc.freenode.net
Unsubscribe: http://plug.org/mailman/options/plug
Don't fear the penguin.
*/

Reply via email to