All posts filed under “Trusted Computing

The Privacy Ceiling

The Privacy Ceiling

Scott Craver of the University of Binghamton has a very interesting post summarising the concept of a ‘privacy ceiling’: “This is an economic limit on privacy violation by companies, owing to the liability of having too much information about (or control over) users.” It’s the […]

The illusion of control

The illusion of control

Scott Adams recounts an anecdote illustrating the ‘illusion of control’ and how important it is to many people – even to the extent that it is the single defining characteristic of mankind which one might use to explain human behaviour to aliens: “The maintenance man […]

Some links: miscellaneous, pertinent to architectures of control

Some links: miscellaneous, pertinent to architectures of control

Ulises Mejias on ‘Confinement, Education and the Control Society’ – fascinating commentary on Deleuze’s societies of control and how the instant communication and ‘life-long learning’ potential (and, I guess, everyware) of the internet age may facilitate control and repression: “This is the paradox of social […]

Uninnovate – engineering products to do less

Uninnovate – engineering products to do less

Image from uninnovate.com I’ve just come across a very interesting new blog, uninnovate.com, which focuses on the phenomenon of “engineering expensive features into a product for which there is no market demand in order to make the product do less.” The first few posts tackle […]

Oh yeah, that Windows Kill Switch

Oh yeah, that Windows Kill Switch

I know the furore surrounding Microsoft’s ‘Windows Genuine Advantage’ is a few days old, and perhaps I should have blogged about it at the time, specifically the rumoured ‘Kill Switch’ which would remotely deactivate any PCs apparently running ‘non-genuine’ copies of XP. That’s certainly a […]

Friend or foe: Battery-authentication ICs?

Friend or foe: Battery-authentication ICs?

Via MAKE, an article from Electrical Design News looking at lithium battery authentication chips in products such as phones and laptops, designed to prevent users fitting ‘non-genuine’ batteries. Now, the immediate response of most of us is probably “razor blade model!” or even “stifling democratic […]

Review: Everyware by Adam Greenfield

Review: Everyware by Adam Greenfield

This is the first book review I’ve done on this blog, though it won’t be the last. In a sense, this is less of a conventional review than an attempt to discuss some of the ideas in the book, and synthesise them with points that […]