Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Trecherous Computing lol

Name: Anonymous 2005-12-14 10:12

I'm writing a debate on Trusted Computing, and after remembering a flash that's more than likely been bumped off of 4chan's /f/, I decided to ack world4ch about it. Anyone have links to good rants or articles on TC that would provide for some solid pros and cons about the issue? You guys could also throw in what you think about TC, as I can quote discussion groups.


mewtnote (lol): I was about to write this on Jackie T. and the Violence in Video Games baloney, but some professor who's much more important than me has already done it. (Very well, I might add.)

Name: Anonymous 2005-12-18 18:35

>>81
Current technology may prevent this as well, only that you don't know it.

Like what? Adobe's PDF encryption? Hardly comparable. Keys and pgp? Not transparent, and a lot easier to circumvent (copy resulting plaintext).

Feel free to link me to a robust solution.

With the difference they're not controlled by craposoft

You ignored my post regarding windows, oracle, etc. Nobody has ever fully disassembled them either. Now what's the Fortune 500 running?

Oh, and you still won't own the keys.

I'll wait for actual implementations before deciding. I know I'm being hopelessly naive here, but I can hope. Since businesses in general would be interested in this, I'm hoping Adam Smith's Invisible Hand will work here, at least for some line of machines.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List