Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Trecherous Computing lol

Name: Anonymous 2005-12-14 10:12

I'm writing a debate on Trusted Computing, and after remembering a flash that's more than likely been bumped off of 4chan's /f/, I decided to ack world4ch about it. Anyone have links to good rants or articles on TC that would provide for some solid pros and cons about the issue? You guys could also throw in what you think about TC, as I can quote discussion groups.


mewtnote (lol): I was about to write this on Jackie T. and the Violence in Video Games baloney, but some professor who's much more important than me has already done it. (Very well, I might add.)

Name: Anonymous 2005-12-18 12:37

>>73
Your large post would be great if it didn't had one fatal flaw: there will definitely be some testing frameworks available to develop and test your applications without an external authorization server. Therefore, it does not prevents you from developing.

treacherous computing is not a security layer, it's a rights infringement layer
Looks like you've learned your 1984-style of argumentation very well. You are just searching excuses to continue being a thief. Too bad it won't be technically possible anymore in a few years, eh?

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List