Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] Conspiracy of Companies Works to Put Treacherous Computing in Linux

  • Subject: [News] Conspiracy of Companies Works to Put Treacherous Computing in Linux
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Tue, 29 Sep 2009 10:55:58 +0100
  • Followup-to: comp.os.linux.advocacy
  • Newsgroups: comp.os.linux.advocacy
  • User-agent: KNode/4.3.1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Linux and the Trusted Platform Module (TPM)

,----[ Quote ]
| Digital Rights Management (DRM) is an example of 
| companies controlling consumers' use of their 
| product, Phorm is an example of a technology 
| delivering targeted advertising based on demographic 
| analysis and TPM and associated technologies such as 
| AMT and TXT are examples of hardware integrated 
| security systems.
| 
| DRM is designed to protect the media companies not 
| the consumer and Phorm benefits the advertiser not 
| the consumer; both are technologies that have 
| generated a strong negative reaction. TPM and other 
| technologies designed to protect the individual 
| computer might seem beneficial to the end user, but 
| are tainted by fears about back door access.
`----

http://www.h-online.com/open/Linux-and-the-Trusted-Platform-Module-TPM--/features/114029


Related:

IBM Brings Trusted Computing to Linux

,----[ Quote ]
| The architecture involves the "Trusted Platform Module" (TPM) chip that 
| provides hardware storage of private keys, making it impossible for hackers 
| to spoof computer systems. Any attempts to hack into the system would change 
| the system code, which could be easily detected. By adding a new feature to 
| Linux, the research team has successfully performed security checks that go 
| above and beyond checking the first few steps in powering on the system, the 
| feature designed by TCG. The new solution validates the operating system 
| kernel and all application software running on the system.       
`----

http://www.linuxelectrons.com/news/linux/15574/ibm-brings-trusted-computing-linux


Trusted Computing

http://www.youtube.com/watch?v=DuI6SLFnGbQ


Cisco, Microsoft, Others Get Together On Security

,----[ Quote ]
| Microsoft, Cisco Systems and the open-standards Trusted Computing 
| Group each developed their own NAC approaches, which use a variety 
| of software and hardware to boost network security.
`----

http://biz.yahoo.com/ibd/070531/tech01.html?.v=1


Why Use Windows Vista?

,----[ Quote ]
| Vista is all about 'premium content'. This is music or video
| that's copyrighted by one of the major music or movie companies.
| Basically, if any such content is being played, Vista goes into
| a sort of 'protected mode'.
`----

http://www.coofercat.com/node/1081


Why the world needs openness, not interoperability.

,----[ Quote ]
| This NAC/NAP lovefest would be laughable if it weren't such
| a kick-in-the-teeth to the rest of the industry, enterprise IT, and
| all Internet users. A Cisco/Microsoft oligopoly stalls implementation,
| stifles innovation, and makes the network less secure. In this way, Cisco
| and Microsoft are standing in the way of progress.
`----

http://news.com.com/2061-11203_3-6112960.html?part=rss&tag=6112960&subj=news


Trusted Or Treacherous Computing?

,----[ Quote ]
| Microsoft describes how to revoke rights to render based on 'who the
| user is, where the user is located, what type of computing device or
| other playback device the user is using, what rendering application
| is calling the copy protection system, the date, the time, etc.' Som
| uch for Microsoft's you-should-have-control assurances.
`----

http://hardware.slashdot.org/article.pl?sid=06/11/24/2135217&from=rss
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkrB2a4ACgkQU4xAY3RXLo6YLQCfQvYvzCH5AW341JEVTYBCKIag
GQYAniG4shr+CoVlQjpOT6A8WlGbIqnP
=iRJ6
-----END PGP SIGNATURE-----

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index