[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy can-you-trust.html
From: |
Therese Godefroy |
Subject: |
www/philosophy can-you-trust.html |
Date: |
Fri, 11 Dec 2015 10:53:44 +0000 |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 15/12/11 10:53:44
Modified files:
philosophy : can-you-trust.html
Log message:
Restore correct spacing between list items.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/can-you-trust.html?cvsroot=www&r1=1.53&r2=1.54
Patches:
Index: can-you-trust.html
===================================================================
RCS file: /webcvs/www/www/philosophy/can-you-trust.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- can-you-trust.html 26 Feb 2015 15:55:11 -0000 1.53
+++ can-you-trust.html 11 Dec 2015 10:53:44 -0000 1.54
@@ -152,15 +152,17 @@
<h3>Postscripts</h3>
<ol>
-<li>The computer security field uses the term “trusted
+<li><p>
+The computer security field uses the term “trusted
computing” in a different way—beware of confusion
-between the two meanings.
-</li>
-<li>The GNU Project distributes the GNU Privacy Guard, a program that
+between the two meanings.</p></li>
+
+<li><p>
+The GNU Project distributes the GNU Privacy Guard, a program that
implements public-key encryption and digital signatures, which you can
use to send secure and private email. It is useful to explore how GPG
differs from treacherous computing, and see what makes one helpful and
-the other so dangerous.
+the other so dangerous.</p>
<p>
When someone uses GPG to send you an encrypted document, and you use
GPG to decode it, the result is an unencrypted document that you can
@@ -172,10 +174,10 @@
Treacherous computing is designed to impose restrictions on the users;
<em>it</em> uses <em>them</em>.</p></li>
-<li>
+<li><p>
The supporters of treacherous computing focus their discourse on its
<a name="beneficial">beneficial uses</a>. What they say is often
-correct, just not important.
+correct, just not important.</p>
<p>
Like most hardware, treacherous-computing hardware can be used for
purposes which are not harmful. But these features can be implemented in
@@ -188,12 +190,13 @@
freedom, while offering minor benefits to distract us from what we
would lose.</p></li>
-<li>Microsoft presents Palladium as a security measure, and claims that
+<li><p>
+Microsoft presents Palladium as a security measure, and claims that
it will protect against viruses, but this claim is evidently false. A
presentation by Microsoft Research in October 2002 stated that one of
the specifications of Palladium is that existing operating systems and
applications will continue to run; therefore, viruses will continue to
-be able to do all the things that they can do today.
+be able to do all the things that they can do today.</p>
<p>
When Microsoft employees speak of “security” in connection with
Palladium, they do not mean what we normally mean by that word:
@@ -216,13 +219,14 @@
do. “Spoofing” doesn't mean someone's fooling you, it means
your fooling Palladium. And so on.</p></li>
-<li>A previous statement by the Palladium developers stated the basic
+<li><p>
+A previous statement by the Palladium developers stated the basic
premise that whoever developed or collected information should have
total control of how you use it. This would represent a revolutionary
overturn of past ideas of ethics and of the legal system, and create
an unprecedented system of control. The specific problems of these
systems are no accident; they result from the basic goal. It is the
-goal we must reject.</li>
+goal we must reject.</p></li>
</ol>
<hr />
@@ -303,7 +307,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/02/26 15:55:11 $
+$Date: 2015/12/11 10:53:44 $
<!-- timestamp end -->
</p>
</div>
- www/philosophy can-you-trust.html,
Therese Godefroy <=