<$BlogRSDURL$>
Former 'Who shell we trust'
Friday, April 01, 2005
  Some good info about TCPA or 'Trusted Computing' FAQ. This document is released under the GNU Free Documentation License. They have several translations of the document. 
Tuesday, July 06, 2004
  Today I feel like writing about the power of the blogsphere. Blogs do help spread the word. Not only do the surfers get the author's statement they are implemental in paving new internet roots. 
Sunday, June 20, 2004
  Based upon Against TCPA | TCPA would TAKE your FREEDOM | This is NO FAKE
How can TCPA be misused and abused?

TCPA tries to register and spy on the content of the hard disks of all the computers connected to the Internet.
It is fine when it is up to pirate software, misic, intellectual property. But it can extend far beyound the economical welfare into political censorship. All TCPA comliant computers will delete and report 'bad' documents, become a remedy of the sensors, and will pose a tremendous obstacle to humanity progress.  
Sunday, June 13, 2004
  Recently I have read a very comprehensive article about the features of the TCPA. The author compared the 'Fritz' chip to spyware.
The comparison is quite reasonable. The chips sends data to the 'big brother' offices and there is no way you can prevent the leakage.
Sounds like a serious breach of the privacy.  
Saturday, May 15, 2004
  This chapter deals with the aliases of the trusted computing

Well It is known by a number of names. Intel, the founder of the project gave it the name 'Trusted computing'. Microsoft went for 'Trustworthy computing'. TCPA is a widely used name.
The companies are changing the working name of the project on the move in order to distract the users' attitude toward it. Intell has jus begun to call it `safer computing'.  
Sunday, May 09, 2004
  The potential evil of the specification comes from three distinct points. The first is a non-malleable “trusted root” for trusted storage. The second is the inability to disable ALL of the functionality of the TPM, and the third is the inability to provide a reasonable degree of privacy. 
Tuesday, March 30, 2004
  What is trusted computing?
Shortly it is a multi-company alliance created in a effort to improve computer-security, protect users from hackers and viruses, spread of pirate software and media.
They created a common standard that plans a secure chip aka Fritz-chip to be implemented in every computer (solded on the motherboard in the first phase).
' Palladium' is software that Microsoft says it plans to incorporate in future versions of Windows. It will run on TCPA hardware and implement some new features.

When you boot up your PC, Fritz chip takes charge. First he checks the boot ROM, the first part of the operating system, loads and executes it, checks the state of the machine; and so on. Then chip checks the installed hardware and drivers. The PC boots normally only when all its components are in approved combination then it gives the control over to TCPA enabled operating system- Windows' Palladium.

So far so good. Sounds very reasonably. But the main issues here are personal privacy and antitrust politics.
 
Former 'Who should we trust' It is up to everyboy to make their own descision. I will keep to the facts

ARCHIVES
Home 03/01/2004 - 04/01/2004 / 05/01/2004 - 06/01/2004 / 06/01/2004 - 07/01/2004 / 07/01/2004 - 08/01/2004 / 04/01/2005 - 05/01/2005 /


Powered by Blogger

blog blog blog java page notca web blogger blog blog1 blo news sites sites pages html page index archive page site page free pics pics pics