Congress shall pass no law limiting the rights of persons to manipulate, operate, or otherwise utilize as they see fit any of their possessions or effects, nor the sale or trade of tools to be used for such purposes. From Artraze commenting on this Slashdot […]
All posts filed under “Trusted Computing”

Some links
First, an apology for anyone who’s had problems with the RSS/Atom feeds over the last month or so. I think they’re fixed now (certainly Bloglines has started picking them up again) but please let me know if you don’t read this. Oops, that won’t work… […]

Digital control round-up
Some developments in – and commentary on – digital architectures of control to end 2006: Peter Gutmann’s ‘A Cost Analysis of Windows Vista Content Protection’ (via Bruce Schneier) looks very lucidly at the effects that Vista’s DRM and measures to ‘protect’ content will have – […]

Uninnovate – engineering products to do less
Image from uninnovate.com I’ve just come across a very interesting new blog, uninnovate.com, which focuses on the phenomenon of “engineering expensive features into a product for which there is no market demand in order to make the product do less.” The first few posts tackle […]

Some links: miscellaneous, pertinent to architectures of control
Ulises Mejias on ‘Confinement, Education and the Control Society’ – fascinating commentary on Deleuze’s societies of control and how the instant communication and ‘life-long learning’ potential (and, I guess, everyware) of the internet age may facilitate control and repression: “This is the paradox of social […]

The illusion of control
Scott Adams recounts an anecdote illustrating the ‘illusion of control’ and how important it is to many people – even to the extent that it is the single defining characteristic of mankind which one might use to explain human behaviour to aliens: “The maintenance man […]

The Privacy Ceiling
Scott Craver of the University of Binghamton has a very interesting post summarising the concept of a ‘privacy ceiling’: “This is an economic limit on privacy violation by companies, owing to the liability of having too much information about (or control over) users.” It’s the […]

Ed Felten: DRM Wars, and ‘Property Rights Management’
At Freedom to Tinker, Ed Felten has posted a summary of a talk he gave at the Usenix Security Symposium, called “DRM Wars: The Next Generation”. The two installments so far (Part 1, Part 2) trace a possible trend in the (stated) intentions of DRM’s […]

Freedom to Tinker – The Freedom to Tinker with Freedom?
At Freedom to Tinker, David Robinson asks whether, in a world where DRM is presented to so many customers as a benefit (e.g. Microsoft’s Zune service), the public as a whole will be quite happy to trade away its freedom to tinker, whether the law […]

Review: Everyware by Adam Greenfield
This is the first book review I’ve done on this blog, though it won’t be the last. In a sense, this is less of a conventional review than an attempt to discuss some of the ideas in the book, and synthesise them with points that […]

Friend or foe: Battery-authentication ICs?
Via MAKE, an article from Electrical Design News looking at lithium battery authentication chips in products such as phones and laptops, designed to prevent users fitting ‘non-genuine’ batteries. Now, the immediate response of most of us is probably “razor blade model!” or even “stifling democratic […]

Oh yeah, that Windows Kill Switch
I know the furore surrounding Microsoft’s ‘Windows Genuine Advantage’ is a few days old, and perhaps I should have blogged about it at the time, specifically the rumoured ‘Kill Switch’ which would remotely deactivate any PCs apparently running ‘non-genuine’ copies of XP. That’s certainly a […]

Forcing functions designed to increase product consumption
A few days ago, Tim Quinn of Dangerous Curve posted an interesting observation on the Simple Control in Products page: “This may not be what you had in mind, but I immediately thought of such things as toothpaste pumps that ‘meter’ use to insure the […]

Interesting quote from Ted Nelson
Just looking up something else, I stumbled across this quote from Ted Nelson. From ‘Ted’s ComParadigm in OneLiners’: “A frying-pan is technology. All human artifacts are technology. But beware anybody who uses this term. Like “maturity” and “reality” and “progress”, the word “technology” has an […]

Technology designed to serve others
Bruce Schneier, in a Wired story, ‘Everyone Wants to ‘Own’ Your PC’, classifies DRM along with worms and viruses as all being specifically intended to remove control of a computer from the user/owner. This is a particularly succinct quote: “When technology serves its owners, it […]

BBspot – New Starforce DRM Uses CD Made from Plastic Explosives
From the always excellent BBspot: ‘New Starforce DRM Uses CD Made from Plastic Explosives’. “Not only does this protect the software from being copied, but it also prevents the copier from ever copying anything again. If we’re lucky we’ll also take out his hacker brother […]