Wednesday, September 20, 2006

Can you trust your computer? - GNU Project - Free Software Foundation (FSF): "In the past, these were isolated incidents. 'Trusted computing' would make it pervasive. 'Treacherous computing' is a more appropriate name, because the plan is designed to make sure your computer will systematically disobey you. In fact, it is designed to stop your computer from functioning as a general-purpose computer. Every operation may require explicit permission.

The technical idea underlying treacherous computing is that the computer includes a digital encryption and signature device, and the keys are kept secret from you. Proprietary programs will use this device to control which other programs you can run, which documents or data you can access, and what programs you can pass them to. These programs will continually download new authorization rules through the Internet, and impose those rules automatically on your work. If you don't allow your computer to obtain the new rules periodically from the Internet, some capabilities will automatically cease to function."





<< Home

This page is powered by Blogger. Isn't yours?

Subscribe to Posts [Atom]