TC Chip

Discussion in 'privacy general' started by Down_Under, Feb 17, 2005.

Thread Status:
Not open for further replies.
  1. Down_Under

    Down_Under Registered Member

    Joined:
    Jan 18, 2005
    Posts:
    56
    Location:
    Brisbane,Qld,Australia
  2. Paranoid2000

    Paranoid2000 Registered Member

    Joined:
    May 2, 2004
    Posts:
    2,839
    Location:
    North West, United Kingdom
    An interesting article - the whole issue of Trusted Computing/Digital Rights Management has so much potential to remove user control of their equipment though, that the only place it is likely to make real headway is with vendor-supplied hardware where the users are purchasing a service and have no choice about the equipment (e.g. cable/satellite decoder boxes).
     
  3. Socio

    Socio Registered Member

    Joined:
    Jun 29, 2004
    Posts:
    362

    So what happens when adware, spyware, worms, trojan and virus makers start making use of the TCG specification? ( You know if there is a way they will and they always find a way)
     
    Last edited: Feb 18, 2005
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.