Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Trecherous Computing lol

Name: Anonymous 2005-12-14 10:12

I'm writing a debate on Trusted Computing, and after remembering a flash that's more than likely been bumped off of 4chan's /f/, I decided to ack world4ch about it. Anyone have links to good rants or articles on TC that would provide for some solid pros and cons about the issue? You guys could also throw in what you think about TC, as I can quote discussion groups.


mewtnote (lol): I was about to write this on Jackie T. and the Violence in Video Games baloney, but some professor who's much more important than me has already done it. (Very well, I might add.)

Name: Anonymous 2005-12-15 19:40

I interpreted your 'we' as 'the security community', since you were trying to sound like an expert.

Uh, last I checked, the security community are usually employed to protect commercial IT infrastructure. You know, networks and things?

That computer you use at work? It probably has a disclaimer, right? That's because the company owns that computer, not you. When you're at work, you're using company property, company bandwidth, and company time. If there's a half-sane policy over there, you don't have administrator access on your work computer anyway, and chances are you don't have any expectation of privacy either.

What you do at home on your own computer isn't our concern, and I don't know where you got that idea. TC will fuck you over there (that's why I don't like it; consider the stifling effects), but I'm pointing out that TC could be very useful indeed in a corporate setting.

And while I'm no expert, this is how I earn my daily bread. Sorry for coming off as if I know something.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List