Trusted computing a shield against worst attacks?
,----[ Quote ]
| The win for trusted computing: The analysis estimated that 84 per cent of
| the attacks disclosed in court filings could have been prevented by
| checking the identity of the device being used to connect to a
| company's network as well as the user.
|
| [...]
|
| The analysis could be the most persuasive argument to date for the
| adoption of trusted computing to increase network security. Trusted
| computing has garnered a great deal of criticism because another primary
| application of the technology - digital rights management (DRM) - could
| significantly reduce consumers' fair use of copyrighted content and give
| third-party content companies a great deal of control over users'
| systems.
|
| [...]
|
| The US Army has required that all procured computer systems include
| the latest version of the Trusted Platform Module. And consumers that buy
| the latest Mac hardware from Apple are also getting the technology.
|
| However, the increase in the number of systems shipped with the
| technology does not mean users are sold on trusted computing. While
| media companies interested in stronger copy protection have already
| bought into the idea, companies have been a harder sell.
`----
http://www.theregister.co.uk/2006/09/03/trusted_computing/
|
|