On Sat, May 06, 2006 at 05:42:09AM -0600, Charles Curley wrote: > Schneier on Security > > A weblog covering security and security technology. > > May 04, 2006 > Who Owns Your Computer? > > When technology serves its owners, it is liberating. When it is > designed to serve others, over the owner's objection, it is > oppressive. There's a battle raging on your computer right now -- > one that pits you against worms and viruses, Trojans, spyware, > automatic update features and digital rights management > technologies. It's the battle to determine who owns your computer. > > You own your computer, of course. You bought it. You paid for > it. But how much control do you really have over what happens on > your machine? Technically you might have bought the hardware and > software, but you have less control over what it's doing behind > the scenes. > > http://www.schneier.com/blog/archives/2006/05/who_owns_your_c.html
A co-worker of mine who developed TrouSerS (the OSS TPM library) pointed out that equating ``Trusted Computing'' with ``Palladium,'' as Schneier did in this article by making the term ``Trusted Computing'' link to an article on Palladium, followed immediately by a comment about technology that tries to own people's computers. This detracts from the legitimate (non-DRM) uses of hardware-assisted key management. Schneier should know better. Mike (My comments here reflect only my own opinions.)
signature.asc
Description: Digital signature
/* PLUG: http://plug.org, #utah on irc.freenode.net Unsubscribe: http://plug.org/mailman/options/plug Don't fear the penguin. */
