TweakTown
Tech content trusted by users in North America and around the world
5,934 Reviews & Articles | 38,231 News Posts

Trusted Computing or Treacherous Computing?

| Posted: Oct 22, 2002 1:38 pm

The Age has an interesting article on how the new security measures companies are taking may affect us all. With Microsoft's Palladium creeping up on the horizon and Hollywood's "Digital Restriction Management", you might find yourself asking one question: Who controls your comptuer?

 

The technical idea underlying treacherous computing is that the computer includes a digital encryption and signature device, and the keys are kept secret from you. (Microsoft's version of this is called "palladium.") Proprietary programs will use this device to control which other programs you can run, which documents or data you can access, and what programs you can pass them to. These programs will continually download new authorization rules through the Internet, and impose those rules automatically on your work. If you don't allow your computer to obtain the new rules periodically from the Internet, some capabilities will automatically cease to function.
More information @ The Age AU

 

Further Reading: Read and find more news at our news index page.

Do you get our news RSS feed? Get It!

Post a Comment about this news

Latest Tech News Posts

View More News Posts

TweakTown Web Poll

Question: Facebook's acquisition of Oculus VR will...

Improve Oculus Rift Development

Hamper Oculus Rift Development

Completely destroy Oculus Rift Development

Let's wait and see, I'm not sure

or View the Results

View More Polls

Forum Activity

View More Forum Posts

Press Releases

View More Press Releases