0
   

Sounds like an expensive can of worms.......

 
 
sumac
 
Reply Wed 2 Jul, 2003 06:02 pm
Quoted in its entirety, this column appeared in the NYTimes of 7/2/03. The URL is at the bottom.

"A Safer System for Home PC's Feels Like Jail to Some Critics
>
> June 30, 2003
> By JOHN MARKOFF
>
>
>
>
>
>
> SAN FRANCISCO, June 29 - Your next personal computer may
> well come with its own digital chaperon.
>
> As PC makers prepare a new generation of desktop computers
> with built-in hardware controls to protect data and digital
> entertainment from illegal copying, the industry is also
> promising to keep information safe from tampering and help
> users avoid troublemakers in cyberspace.
>
> Silicon Valley - led by Microsoft and Intel - calls the
> concept "trusted computing." The companies, joined by
> I.B.M., Hewlett-Packard, Advanced Micro Devices and others,
> argue that the new systems are necessary to protect
> entertainment content as well as safeguard corporate data
> and personal privacy against identity theft. Without such
> built-in controls, they say, Hollywood and the music
> business will refuse to make their products available
> online.
>
> But by entwining PC software and data in an impenetrable
> layer of encryption, critics argue, the companies may be
> destroying the very openness that has been at the heart of
> computing in the three decades since the PC was introduced.
> There are simpler, less intrusive ways to prevent illicit
> file swapping over the Internet, they say, than girding
> software in so much armor that new types of programs from
> upstart companies may have trouble working with it.
>
> "This will kill innovation," said Ross Anderson, a computer
> security expert at Cambridge University, who is organizing
> opposition to the industry plans. "They're doing this to
> increase customer lock-in. It will mean that fewer software
> businesses succeed and those who do succeed will be large
> companies."
>
> Critics complain that the mainstream computer hardware and
> software designers, under pressure from Hollywood, are
> turning the PC into something that would resemble video
> game players, cable TV and cellphones, with manufacturers
> or service providers in control of which applications run
> on their systems.
>
> In the new encrypted computing world, even the most mundane
> word-processing document or e-mail message would be
> accompanied by a software security guard controlling who
> can view it, where it can be sent and even when it will be
> erased. Also, the secure PC is specifically intended to
> protect digital movies and music from online piracy.
>
> But while beneficial to the entertainment industry and
> corporate operations, the new systems will not necessarily
> be immune to computer viruses or unwanted spam e-mail
> messages, the two most severe irritants to PC users.
>
> "Microsoft's use of the term `trusted computing' is a great
> piece of doublespeak," said Dan Sokol, a computer engineer
> based in San Jose, Calif., who was one of the original
> members of the Homebrew Computing Club, the pioneering PC
> group. "What they're really saying is, `We don't trust you,
> the user of this computer.' "
>
> The advocates of trusted computing argue that the new
> technology is absolutely necessary to protect the privacy
> of users and to prevent the theft of valuable intellectual
> property, a reaction to the fact that making a perfect
> digital copy is almost as easy as clicking a mouse button.
>
> "It's like having a little safe inside your computer,"
> said Bob Meinschein, an Intel security architect. "On the
> corporate side the value is much clearer," he added, "but
> over time the consumer value of this technology will become
> clear as well" as more people shop and do other business
> transactions online.
>
> Industry leaders also contend that none of this will stifle
> innovation. Instead, they say, it will help preserve and
> expand general-purpose computing in the Internet age.
>
> "We think this is a huge innovation story," said Mario
> Juarez, Microsoft's group product manager for the company's
> security business unit. "This is just an extension of the
> way the current version of Windows has provided innovation
> for players up and down the broad landscape of computing."
>
> The initiative is based on a new specification for
> personal computer hardware, first introduced in 2000 and
> backed by a group of companies called the Trusted Computing
> Group. It also revolves around a separate Microsoft plan,
> now called the Next Generation Secure Computing Base, that
> specifies a tamper-proof portion of the Windows operating
> system.
>
> The hardware system is contained in a set of separate
> electronics that are linked to the personal computer's
> microprocessor chip, known as the Trusted Platform Module,
> or T.P.M. The device includes secret digital keys - large
> binary numbers - that cannot easily be altered. The Trusted
> Computing Group is attempting to persuade other industries,
> like the mobile phone industry and the makers of personal
> digital assistants, to standardize on the technology as
> well.
>
> The plans reflect a shift by key elements of the personal
> computer industry, which in the past had resisted going
> along with the entertainment industry and what some said
> they feared would be draconian controls that would greatly
> curtail the power of digital consumer products.
>
> Industry executives now argue that by embedding the digital
> keys directly in the hardware of the PC, tampering will be
> much more difficult. But they acknowledge that no security
> system is perfect.
>
> The hardware standard is actually the second effort by
> Intel to build security directly into the circuitry of the
> PC. The first effort ended in a public relations disaster
> for Intel in 1999 when consumers and civil liberties groups
> revolted against the idea. The groups coined the slogan
> "Big Brother Inside," and charged that the technology could
> be used to violate user privacy.
>
> "We don't like to make the connection," said Mr.
> Meinschein. "But we did learn from it."
>
> He said the new T.P.M. design requires the computer owner
> to switch on the new technology voluntarily and that it
> contains elaborate safeguards for protecting individual
> identity.
>
> The first computers based on the hardware design have just
> begun to appear from I.B.M. and Hewlett-Packard for
> corporate customers. Consumer-oriented computer makers like
> Dell Computer and Gateway are being urged to go along but
> have not yet endorsed the new approach.
>
> How consumers will react to the new technology is a thorny
> question for PC makers because the new industry design
> stands in striking contrast to the approach being taken by
> Apple Computer.
>
> Apple has developed the popular iTunes digital music store
> relying exclusively on software to restrict the sharing of
> digital songs over the Internet. Apple's system, which has
> drawn the support of the recording industry, permits
> consumers to share songs freely among up to three
> Macintoshes and an iPod portable music player.
>
> Apple only has a tiny share of the personal computer
> market. But it continues to tweak the industry leaders with
> its innovations; last week, Apple's chief executive, Steven
> P. Jobs, demonstrated a feature of the company's newest
> version of its OS X operating system called FileVault,
> designed to protect a user's documents without the need for
> modifying computer hardware.
>
> Mr. Jobs argued that elaborate hardware-software schemes
> like the one being pursued by the Trusted Computing Group
> will not achieve their purpose.
>
> "It's a falsehood," he said. "You can prove to yourself
> that that hardware doesn't make it more secure."
>
> That is not Microsoft's view. The company has begun showing
> a test copy of a variation of its Windows operating system
> that was originally named Palladium. The name was changed
> last year after a trademark dispute.
>
> In an effort to retain the original open PC environment,
> the Microsoft plan offers the computer user two separate
> computing partitions in a future version of Windows. Beyond
> changing the appearance and control of Windows, the system
> will also require a new generation of computer hardware,
> not only replacing the computer logic board but also
> peripherals like mice, keyboards and video cards.
>
> Executives at Microsoft say they tentatively plan to
> include the technology in the next version of Windows -
> code-named Longhorn - now due in 2005.
>
> The company is dealing with both technical and marketing
> challenges presented by the new software security system.
> For example, Mr. Juarez, the Microsoft executive, said that
> if the company created a more secure side to its operating
> system software, customers might draw the conclusion that
> its current software is not as safe to use.
>
> Software developers and computer security experts, however,
> said they were not confident that Microsoft would retain
> its commitment to the open half of what is planned to be a
> two-sided operating system.
>
> "My hackles went up when I read Microsoft describing the
> trusted part of the operating system as an option," said
> Mitchell D. Kapor, the founder of Lotus Development
> Corporation, and a longtime Microsoft competitor. "I don't
> think that's a trustworthy statement."
>
> One possibility, Mr. Kapor argued, is that Microsoft could
> release versions of applications like its Office suite of
> programs that would only run on the secure part of the
> operating system, forcing users to do their work in the
> more restricted environment.
>
> Microsoft denies that it is hatching an elaborate scheme to
> deploy an ultra-secret hardware system simply to protect
> its software and Hollywood's digital content. The company
> also says the new system can help counter global cybercrime
> without creating the repressive <object.title class="Movie"
> idsrc="nyt_ttl" value="149324">"Big Brother"</object.title>
> society imagined by George Orwell in <object.title
> class="Movie" idsrc="nyt_ttl"
> value="91;104070">"1984."</object.title>
>
> Microsoft is committed to "working with the government and
> the entire industry to build a more secure computing
> infrastructure here and around the world," Bill Gates,
> Microsoft's chairman, told a technology conference in
> Washington on Wednesday. "This technology can make our
> country more secure and prevent the nightmare vision of
> George Orwell at the same time."
>
> The critics are worried, however, that the rush to create
> more secure PC's may have unintended consequences.
> Paradoxically, they say, the efforts to lock up data safely
> against piracy could serve to make it easier for pirates to
> operate covertly.
>
> Indeed, the effectiveness of the effort to protect
> intellectual property like music and movies has been
> challenged in two independent research papers. One was
> distributed last year by a group of Microsoft computer
> security researchers; a second paper was released last
> month by Harvard researchers.
>
> The research papers state that computer users who share
> files might use the new hardware-based security systems to
> create a "Darknet," a secure, but illegal network for
> sharing digital movies and music or other illicit
> information that could be exceptionally hard for security
> experts to crack.
>
> "This is a Pandora's box and I don't think there has been
> much thought about what can go wrong," said Stuart
> Schechter, a Harvard researcher who is an author of one of
> the papers. "This is one of those rare times we can prevent
> something that will do more harm than good."
>
> http://www.nytimes.com/2003/06/30/technology/30SECU.html?ex=1058145982&ei=1&en=1c2b90c39e043caf"
>
>
  • Topic Stats
  • Top Replies
  • Link to this Topic
Type: Discussion • Score: 0 • Views: 1,030 • Replies: 7
No top replies

 
sumac
 
  1  
Reply Thu 3 Jul, 2003 05:53 pm
Come on you wimps, voice an opinion, to quote:



Beyond
> changing the appearance and control of Windows, the system
> will also require a new generation of computer hardware,
> not only replacing the computer logic board but also
> peripherals like mice, keyboards and video cards.
0 Replies
 
Craven de Kere
 
  1  
Reply Thu 3 Jul, 2003 06:39 pm
I'd never use a computer like that.
0 Replies
 
sumac
 
  1  
Reply Fri 4 Jul, 2003 03:06 am
Neither would I, but why does it turn you off?
0 Replies
 
Craven de Kere
 
  1  
Reply Fri 4 Jul, 2003 03:25 am
Most of the problems inherent to the computers we use are due to the wide range of applications, configurations, platforms etc that work together. It's complex, filled with holes, not well standardized etc etc etc.

All this requires a greater amount of knowledge about what you are operating then does a sigle service application such as a TV.

But if you are able to keep up with the requirements the frustration that comes with puter use is lessened.

Making stable and secure platforms through the methods outlined in the article are just about the only way to do so.

It would be a trade off of available applications and functions for stability and security. But I'd rather be able to do what I want with a computer, i'd find the limitation of the function more frustrating than the lessened stability and security.
0 Replies
 
sumac
 
  1  
Reply Mon 7 Jul, 2003 08:32 pm
Thanks, Craven.
0 Replies
 
fishin
 
  1  
Reply Tue 8 Jul, 2003 05:55 am
The whole way this is being presented to the public creates a huge paradox. "Trusted computing" relies on the system being able to positively ID the user at the keyboard/mouse and ensures that user only has access to content they are authorized to view while preventing others from accessing their data. Somehow, all of this absolute recognition world-wide is supposed to protect our privacy?

Once a trusted system is in place there is absolute knowledge of who went where on the 'net, what they saw, who they communicated with, etc.. Any current concept of "privacy" is gone... Every web site you might visit would know exactly who you are.
0 Replies
 
Ceili
 
  1  
Reply Wed 9 Jul, 2003 10:17 pm
I can foresee having two computers in the future. The present model - the 'Pirate Internet' til phased out, god knows when - and the 'newspeak', safer version.

I belive there is a huge market for such a system but it's implications, as Harvard indicates, can be terrifying.

I'm fairly computer illiterate. I find it difficult to keep up with all the new technology, it's mind boggling. But I resent having to pay for constant products and upgrades to patch problems I feel should have be included in the damn computer in the first place.

thanks,
Ceili
0 Replies
 
 

Related Topics

Clone of Micosoft Office - Question by Advocate
Do You Turn Off Your Computer at Night? - Discussion by Phoenix32890
The "Death" of the Computer Mouse - Discussion by Phoenix32890
Windows 10... - Discussion by Region Philbis
Surface Pro 3: What do you think? - Question by neologist
Windows 8 tips thread - Discussion by Wilso
GOOGLE CHROME - Question by Setanta
.Net and Firefox... - Discussion by gungasnake
Hacking a computer and remote access - Discussion by trying2learn
 
  1. Forums
  2. » Sounds like an expensive can of worms.......
Copyright © 2024 MadLab, LLC :: Terms of Service :: Privacy Policy :: Page generated in 0.03 seconds on 05/05/2024 at 10:33:21