Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] Conspiracy of Companies Works to Put Treacherous Computing in Linux

  • Subject: [News] Conspiracy of Companies Works to Put Treacherous Computing in Linux
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Tue, 29 Sep 2009 10:55:58 +0100
  • Followup-to: comp.os.linux.advocacy
  • Newsgroups: comp.os.linux.advocacy
  • User-agent: KNode/4.3.1
Hash: SHA1

Linux and the Trusted Platform Module (TPM)

,----[ Quote ]
| Digital Rights Management (DRM) is an example of 
| companies controlling consumers' use of their 
| product, Phorm is an example of a technology 
| delivering targeted advertising based on demographic 
| analysis and TPM and associated technologies such as 
| AMT and TXT are examples of hardware integrated 
| security systems.
| DRM is designed to protect the media companies not 
| the consumer and Phorm benefits the advertiser not 
| the consumer; both are technologies that have 
| generated a strong negative reaction. TPM and other 
| technologies designed to protect the individual 
| computer might seem beneficial to the end user, but 
| are tainted by fears about back door access.



IBM Brings Trusted Computing to Linux

,----[ Quote ]
| The architecture involves the "Trusted Platform Module" (TPM) chip that 
| provides hardware storage of private keys, making it impossible for hackers 
| to spoof computer systems. Any attempts to hack into the system would change 
| the system code, which could be easily detected. By adding a new feature to 
| Linux, the research team has successfully performed security checks that go 
| above and beyond checking the first few steps in powering on the system, the 
| feature designed by TCG. The new solution validates the operating system 
| kernel and all application software running on the system.       


Trusted Computing


Cisco, Microsoft, Others Get Together On Security

,----[ Quote ]
| Microsoft, Cisco Systems and the open-standards Trusted Computing 
| Group each developed their own NAC approaches, which use a variety 
| of software and hardware to boost network security.


Why Use Windows Vista?

,----[ Quote ]
| Vista is all about 'premium content'. This is music or video
| that's copyrighted by one of the major music or movie companies.
| Basically, if any such content is being played, Vista goes into
| a sort of 'protected mode'.


Why the world needs openness, not interoperability.

,----[ Quote ]
| This NAC/NAP lovefest would be laughable if it weren't such
| a kick-in-the-teeth to the rest of the industry, enterprise IT, and
| all Internet users. A Cisco/Microsoft oligopoly stalls implementation,
| stifles innovation, and makes the network less secure. In this way, Cisco
| and Microsoft are standing in the way of progress.


Trusted Or Treacherous Computing?

,----[ Quote ]
| Microsoft describes how to revoke rights to render based on 'who the
| user is, where the user is located, what type of computing device or
| other playback device the user is using, what rendering application
| is calling the copy protection system, the date, the time, etc.' Som
| uch for Microsoft's you-should-have-control assurances.

Version: GnuPG v1.4.9 (GNU/Linux)


[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index