Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Trecherous Computing lol

Name: Anonymous 2005-12-14 10:12

I'm writing a debate on Trusted Computing, and after remembering a flash that's more than likely been bumped off of 4chan's /f/, I decided to ack world4ch about it. Anyone have links to good rants or articles on TC that would provide for some solid pros and cons about the issue? You guys could also throw in what you think about TC, as I can quote discussion groups.


mewtnote (lol): I was about to write this on Jackie T. and the Violence in Video Games baloney, but some professor who's much more important than me has already done it. (Very well, I might add.)

Name: Anonymous 2005-12-18 17:39

>>79
However, TC prevents people from accidentally sending the document where it shouldn't go
It may be accidental, or "accidental", just like taking a picture.

Current technology may prevent this as well, only that you don't know it.


The same can be said for the BIOS and the rest of the hardware.
With the difference they're not controlled by craposoft or doing anything shitty, and if it did, we'd realize soon enough - the hard thing would be not to realize it. If you're not a sysadmin or a dev you have no authority to talk about this because you don't know how it is. Oh, and you still won't own the keys. You may own subkeys for your documents, but all you do runs under billy's and riaa's keys and rules and with their knowledge, so you're not only not increasing your corporate security, but you're already fucking it because you're revealing private data to absolutely shitty corporations infamous for their evil intentions.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List