-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Linux and the Trusted Platform Module (TPM)
,----[ Quote ]
| Digital Rights Management (DRM) is an example of
| companies controlling consumers' use of their
| product, Phorm is an example of a technology
| delivering targeted advertising based on demographic
| analysis and TPM and associated technologies such as
| AMT and TXT are examples of hardware integrated
| security systems.
|
| DRM is designed to protect the media companies not
| the consumer and Phorm benefits the advertiser not
| the consumer; both are technologies that have
| generated a strong negative reaction. TPM and other
| technologies designed to protect the individual
| computer might seem beneficial to the end user, but
| are tainted by fears about back door access.
`----
http://www.h-online.com/open/Linux-and-the-Trusted-Platform-Module-TPM--/features/114029
Related:
IBM Brings Trusted Computing to Linux
,----[ Quote ]
| The architecture involves the "Trusted Platform Module" (TPM) chip that
| provides hardware storage of private keys, making it impossible for hackers
| to spoof computer systems. Any attempts to hack into the system would change
| the system code, which could be easily detected. By adding a new feature to
| Linux, the research team has successfully performed security checks that go
| above and beyond checking the first few steps in powering on the system, the
| feature designed by TCG. The new solution validates the operating system
| kernel and all application software running on the system.
`----
http://www.linuxelectrons.com/news/linux/15574/ibm-brings-trusted-computing-linux
Trusted Computing
http://www.youtube.com/watch?v=DuI6SLFnGbQ
Cisco, Microsoft, Others Get Together On Security
,----[ Quote ]
| Microsoft, Cisco Systems and the open-standards Trusted Computing
| Group each developed their own NAC approaches, which use a variety
| of software and hardware to boost network security.
`----
http://biz.yahoo.com/ibd/070531/tech01.html?.v=1
Why Use Windows Vista?
,----[ Quote ]
| Vista is all about 'premium content'. This is music or video
| that's copyrighted by one of the major music or movie companies.
| Basically, if any such content is being played, Vista goes into
| a sort of 'protected mode'.
`----
http://www.coofercat.com/node/1081
Why the world needs openness, not interoperability.
,----[ Quote ]
| This NAC/NAP lovefest would be laughable if it weren't such
| a kick-in-the-teeth to the rest of the industry, enterprise IT, and
| all Internet users. A Cisco/Microsoft oligopoly stalls implementation,
| stifles innovation, and makes the network less secure. In this way, Cisco
| and Microsoft are standing in the way of progress.
`----
http://news.com.com/2061-11203_3-6112960.html?part=rss&tag=6112960&subj=news
Trusted Or Treacherous Computing?
,----[ Quote ]
| Microsoft describes how to revoke rights to render based on 'who the
| user is, where the user is located, what type of computing device or
| other playback device the user is using, what rendering application
| is calling the copy protection system, the date, the time, etc.' Som
| uch for Microsoft's you-should-have-control assurances.
`----
http://hardware.slashdot.org/article.pl?sid=06/11/24/2135217&from=rss
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkrB2a4ACgkQU4xAY3RXLo6YLQCfQvYvzCH5AW341JEVTYBCKIag
GQYAniG4shr+CoVlQjpOT6A8WlGbIqnP
=iRJ6
-----END PGP SIGNATURE-----
|
|