All posts filed under “Trusted Computing

The Hacker’s Amendment

The Hacker’s Amendment

Congress shall pass no law limiting the rights of persons to manipulate, operate, or otherwise utilize as they see fit any of their possessions or effects, nor the sale or trade of tools to be used for such purposes. From Artraze commenting on this Slashdot […]

Breaking Racial Sound Barriers

Breaking Racial Sound Barriers

Via Furdlog, a Washington Post article by Christopher John Farley, “Breaking Racial Sound Barriers”, presents an interesting spin on the likelihood of architectures of control creating/enforcing/reinforcing a marginalised “technology underclass,” as I previously discussed (to some extent, anyway) in Some implications of architectures of control.

“Sign software on the digital line”

“Sign software on the digital line”

Bill Thompson, of the BBC’s ‘Go Digital’ programme, sets out very clearly (‘Sign software on the digital line’) many of the issues involved with ‘trusted computing’ and forcing the use of signed software.

Intel Viiv: control through integrated systems

Intel Viiv: control through integrated systems

Via Furdlog: Intel’s new Viiv technology, the basis of a new range of dual-core processor ‘home media centres,’ will, apparently mean that: “PCs would work with televisions and digital recorders and portable devices so people could move their entertainment wherever they wanted.” (LA Times story)

Technology designed to serve others

Technology designed to serve others

Bruce Schneier, in a Wired story, ‘Everyone Wants to ‘Own’ Your PC’, classifies DRM along with worms and viruses as all being specifically intended to remove control of a computer from the user/owner. This is a particularly succinct quote: “When technology serves its owners, it […]