On Friday 09 February 2007 18:26, Tim Thornton wrote:
...
I can trust your computer not to reveal my secrets to you,
Do you not see how this is a bad thing - how this can be abused?
I buy a car. It does what I tell it (well it would if I drove). I buy
a hammer it bangs what I want to bang. I
On 09/02/07, Nic James Ferrier wrote:
Tim Thornton [EMAIL PROTECTED] writes:
I believe it to be orthogonal to DRM. In the trusted computing
space,
your secrets are secret, as are mine. I can trust your computer not
to
reveal my secrets to you, and you can trust that I can't get at
On 09/02/07, vijay chopra wrote:
There's not a single benefit that treacherous computing brings that
cannot
be solved another way, in your example you can hold secrets via any
number of numerous encryption methods, my home PC has a whole
encrypted
partition for data security. Why do I need a
Hi,
This is a did you know... announcement... :-)
It's a bit on the long side, so please excuse me for that.
This projects been going for sometime, and we've made release announcements
in the usual places for the type of project (python conferences, open source
conferences, FAVE,
At 14:27 + 8/2/07, John wrote:
why is this a problem?
they're only making sure no scalywags get in.
It's OK. I won't be there.
Gordo
--
Think Feynman/
http://pobox.com/~gordo/
[EMAIL PROTECTED]///
-
Sent via the backstage.bbc.co.uk discussion group. To unsubscribe, please
On 10/02/07, Michael Sparks wrote:
On Friday 09 February 2007 18:26, Tim Thornton wrote:
...
I can trust your computer not to reveal my secrets to you,
Do you not see how this is a bad thing - how this can be abused?
I buy a car. It does what I tell it (well it would if I drove). I buy
a
On 10/02/07, Michael Sparks wrote:
The TPM was designed with this in mind, and each TPM has its own
keys.
Because they're internal to the TPM and can't be extracted by
software,
you can have confidence in the TPM's authenticity.
This is wy off topic, but how does a remote third party
Gordon Joly [EMAIL PROTECTED] writes:
It's OK. I won't be there.
Tee hee. Neither will I. Though it might be fun becuase when BT
de-resourced me last month I was given specific instructions not to
connect to their network.
Port 23 is open btw.
--
Nic Ferrier
http://www.tapsellferrier.co.uk
Oh, and where did you get the idea that DRM is a benefit
to the computer's owner?
It's a benefit to me, in that I subscribe to an online music library for
less than I used to spend on CDs. I have more music, and more money - I
call that a benefit.
That requires neither treacherous
Tim Thornton [EMAIL PROTECTED] writes:
No, in the PC space it's only constrained if you want it to be. Most PCs
sold today have a TPM, which is rarely used (I've only met one person so
far who uses their TPM, and I work in the industry). You need to enable
it. You can use it to constrain your
On Saturday 10 February 2007 22:28, Tim Thornton wrote:
...
Regarding the other longer mail, many thanks for that - I'll read up on the
references. I'd made some assumptions about the system, but hadn't realised
that there were some keys I was unaware of the the TPM and the fact that
there is
On 10/02/07, Nic James Ferrier wrote:
You work in the industry and you've only met one person who uses
it. So why are firms still putting it in their products? Surely a
motherboard would be cheaper without it?
Of course it's cheaper not to install a TPM, but it's chicken and egg -
to take
At 15:42 + 8/2/07, Dave Crossland wrote:
On 06/02/07, Richard P Edwards [EMAIL PROTECTED] wrote:
We also know that the BBC has content that they own
100% of the copyright.
This is, apparently, not the case at all for the majority of existing records.
However, moving forward, I see no
13 matches
Mail list logo