[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Separate trusted computing designs

From: Pierre THIERRY
Subject: Re: Separate trusted computing designs
Date: Fri, 1 Sep 2006 17:09:16 +0200
User-agent: Mutt/1.5.13 (2006-08-11)

Scribit Michal Suchanek dies 30/08/2006 hora 21:14:
> b) I want to buy a service, and the provider requests that it runs on
> certain hardware/OS/PC color/whatever. Today I have the choice to
> access the service in any way I want. TPM would forbid it.

This is not a technical issue. In many countries, it may still be
illegal to use TPM this way, because when you sell somethign publicly,
you have not the right to restrict to whom you sell it.

If DCMA-like finally succeeds, and it is an accepted use, even in
courts, of TPM/TC, we have to fight for laws that forbids this. TPM/TC
can become weapons. Let's forbid their use as weapons, as for many other

In Aikido, I study the use of a staff as a weapon. I can use the staff
as a tool, get a brush on a tip and use it as broom. I can even practice
fighting alone or with another person that agreed to, if we take some
security measures. I'm totally forbidden to hit anyone with the staff,
though, and can go in jail just for being aggressive with the staff in

Why couldn't it be possible for TPM/TC? (if it's in fact impossible,
then I would probably agree that it is an undesirable technology)

Nowhere man
OpenPGP 0xD9D50D8A

Attachment: signature.asc
Description: Digital signature

reply via email to

[Prev in Thread] Current Thread [Next in Thread]