Linux-Libre and Trechearous Computing
davide89v
davide89v at riseup.net
Mon Feb 15 23:19:26 UTC 2010
"It can't limit what you do [...]. It needs non-free software to do
that."
This is not true
http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
http://www.eema.org/downloads/security_articles/trusted_computing.pdf
http://www.schneier.com/blog/archives/2005/08/trusted_computi.html
http://www.schneier.com/crypto-gram-0208.html#1
TC can control everything.
http://www.trustedcomputinggroup.org/trusted_computing
This is not theory but reality
http://www.wired.com/gadgets/mac/commentary/cultofmac/2005/08/68501
http://news.cnet.com/2100-1016_3-5819211.html
http://cyberlaw.stanford.edu/blogs/bechtold/archives003235.shtml
Also this "[...] TPMs that we know we control." is false because when
will be available only trusted system?
http://www.trustedcomputinggroup.org/solutions/network_security
It is naive to use the TC for good benefits, because they are born for
to violate our security and slowly in silence the hardware and software
vendors are filling the world of trusted systems
[6] http://www.msnbc.msn.com/ID/10441443
http://www.chillingeffects.org/weather.cgi?WeatherID=534
More information about the linux-libre
mailing list