Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Trecherous Computing lol

Name: Anonymous 2005-12-14 10:12

I'm writing a debate on Trusted Computing, and after remembering a flash that's more than likely been bumped off of 4chan's /f/, I decided to ack world4ch about it. Anyone have links to good rants or articles on TC that would provide for some solid pros and cons about the issue? You guys could also throw in what you think about TC, as I can quote discussion groups.


mewtnote (lol): I was about to write this on Jackie T. and the Violence in Video Games baloney, but some professor who's much more important than me has already done it. (Very well, I might add.)

Name: Anonymous 2005-12-19 1:51

Right now I can think of enforcing PGP for all external email in your SMTP server

Doesn't cover laptops, usb drives, cd/dvds, etc. The solution you propose is a default-open policy, because rather than taking care of the problem at the source, you're trying to plug them as they come up.

Too many users with too much knowledge to let it pass, rest assured.

Same could be said for TC.

As a matter of fact, all of microsoft's OS protection schemes are caught, studied, and cracked even before the OS is officially released.

Different problem. Either the OS runs, or it doesn't. That makes hunting for the proverbial needle a whole lot easier. Now, what else might the software be doing?

You can have hopes for world peace

I don't think it's that far out there. As I said, other IT departments would no doubt be

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List