Linux-Libre and Trechearous Computing

davide89v davide89v at riseup.net
Mon Feb 15 23:19:26 UTC 2010


"It can't limit what you do [...]. It needs non-free software to do
that." 
This is not true
    http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
    http://www.eema.org/downloads/security_articles/trusted_computing.pdf
    http://www.schneier.com/blog/archives/2005/08/trusted_computi.html
    http://www.schneier.com/crypto-gram-0208.html#1
    
TC can control everything.

   http://www.trustedcomputinggroup.org/trusted_computing

This is not theory but reality 

    http://www.wired.com/gadgets/mac/commentary/cultofmac/2005/08/68501
    http://news.cnet.com/2100-1016_3-5819211.html
    http://cyberlaw.stanford.edu/blogs/bechtold/archives003235.shtml

Also this "[...] TPMs that we know we control." is false because when
will be available only trusted system? 

http://www.trustedcomputinggroup.org/solutions/network_security

It is naive to use the TC for good benefits, because they are born for 
to violate our security and slowly in silence the hardware and software
vendors are filling the world of trusted systems

[6] http://www.msnbc.msn.com/ID/10441443
    http://www.chillingeffects.org/weather.cgi?WeatherID=534


More information about the linux-libre mailing list