Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Trecherous Computing lol

Name: Anonymous 2005-12-14 10:12

I'm writing a debate on Trusted Computing, and after remembering a flash that's more than likely been bumped off of 4chan's /f/, I decided to ack world4ch about it. Anyone have links to good rants or articles on TC that would provide for some solid pros and cons about the issue? You guys could also throw in what you think about TC, as I can quote discussion groups.


mewtnote (lol): I was about to write this on Jackie T. and the Violence in Video Games baloney, but some professor who's much more important than me has already done it. (Very well, I might add.)

Name: Anonymous 2005-12-18 8:45

>>65
See how we don't need treacherous computing at all?

Not exactly. Let's say I have a document I absolutely do not want to leave the organization. How would you reliably prevent that from happening with the current system?

A security system will be as strong as the single strongest layer.

Which could well be TC.

Morever, you can't consider "secure" something that's completely out of your control and knowledge

Which is why I quite clearly (twice already) have stated I'm only interested in TC unless the only people holding the keys to the systems is the corporate entity that owns the machines. The IT and legal departments, right?

Of course, we can't be 100% certain what Windows, Oracle, zOS, SAP, etc, are doing either, and most people don't look at OSS code (they rely on reputation), so I'm not certain how much of a change it'll be. Not that I'm in favour of other entities being in the picture.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List