On Sat, 6 May 2006, Michael Halcrow wrote:
http://www.schneier.com/blog/archives/2006/05/who_owns_your_c.html

A co-worker of mine who developed TrouSerS (the OSS TPM library)
pointed out that equating ``Trusted Computing'' with ``Palladium,'' as
Schneier did in this article by making the term ``Trusted Computing''
link to an article on Palladium, followed immediately by a comment
about technology that tries to own people's computers. This detracts
from the legitimate (non-DRM) uses of hardware-assisted key
management.

Schneier should know better.

I've never been able to nail down a case of a non-evil use of this technology that couldn't be done purely in software or with a much simpler piece of hardware. Could you describe one or two, please? (And as to naming, you have to admit that they've come up with a bewildering number of terms for everyone to keep straight.)

                                                        -J

/*
PLUG: http://plug.org, #utah on irc.freenode.net
Unsubscribe: http://plug.org/mailman/options/plug
Don't fear the penguin.
*/

Reply via email to