I just read that several major computer manufacturers (Dell, HP, etc.)
recently began selling computers with so called "trusted computing"
modules. This is a very important technology, and it is VITAL that
every computer user understand it, because it will fundamentally change
the way you use your computer. Trusted computing modules are a bit of
hardware that act like a lock for your whole computer. They get to
decide which programs get run, and which don't. This lets computer
manufacturers make new features like email that can't be forwarded, or
music that can only be played on one machine. They can put an end to
viruses and spam. They way they do this, however, is VERY SCARY.
Trusted computing is not about you (the user) being able to trust your
computer. Trusted computing is about computer manufacturers being able
to trust you. This is because the computer manufacturers do not give
you the key to the trusted computing module when you buy your computer.
They keep it, and use it to decide whether or not you may run any
particular piece of software. Trusted computing means that they decide
whether or not you get to access your pictures 10 years from now, or
whether you need to pay them to do it. Trusted computing is about
whether or not you may access a web site or not without their
permission. Trusted computing is about ending the free exchange of
information that the internet has created and replacing it with a small
group of companies that get to decide what you see and hear.
Television, movies, news, music, emails, and IM can all be censored
effectively using trusted computing. They say they won't, of course,
but can you trust them to keep their word?
Trusted computing is here and now. However, before they can lock us
out, they need to gather a critical mass of trusted computers such that
users have a choice of using trusted computing, or not communicating at
all. The next computer you buy, ask if it has a trusted computing
module. If it does, ask if they will give you the key to it. If they
say no, then you know that they want to keep control of your
information and communication. Don't buy, and tell them why. Without
a critical mass of trusted computing modules online, they are
powerless. Tell them you'd rather deal with spam than have a computer
that doesn't trust you. And tell your friends about trusted computing.
The above is my understanding of trusted computing, but you should
decide for yourself. I encourage you to visit the following links, and
learn about trusted computing yourself. These links were among the top
10 results in a google search for "trusted computing", and I would
encourage you to conduct your own research as well.
http://www.newsforge.com/business/02/10/21/1449250.shtml?tid=19
http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
https://www.trustedcomputinggroup.org/home
http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php