Trusted Computing 241
derrickoswald writes "John Walker, one of the founders of Autodesk, has posted The Digital Imprimatur, a monograph on technologies such as the Trusted Computing initiative.
Some of the prognostications and conclusions reached may not be palatable to Slashdot readers."
I'll be back... Reading to do... (Score:2, Funny)
Anyone who posts in the next hour or so that claims to have RTFA either just skimmed it or is lying. Happy reading!
Speed Reading!! (Score:2)
Re:Speed Reading!! (Score:2)
Read the second paragraph (after the introduction if there is one)
So I got:
Then I searched Speak Freely on the Google, and found lots of "military-grade" remote and local vulnerabilities [insecure.org]
After this I stopped reading the article.
Re:Speed Reading!! (Score:2)
This is a classic example of a logically fallacious ad hominem attack. Because someone working on a FREE project used traditional, error-prone C developement methods, you've decided to discount his opinions on the trends for large-scale networking applications.
Already slow (Score:3, Informative)
Re:Already slow (Score:2, Insightful)
Trusted Computing (Score:2, Funny)
Hm, what?
Oh... so you mean... you mean you're not joking?
Lessig said it first (Score:5, Insightful)
That was the thesis of Lawrence Lessig's 5 year old book, "Code and Other Laws of Cyberspace". The internet is artificial. It's not a force of nature. Human effort built it, and human laws can change it. With sufficient financial motivation, laws will change it.
Tired quotations like "The internet treats censorship as damage, and routes around it" are at best observations of recent behavior, not guarantees that truely effective internet censorship won't happen in the future.
Those who care about freedom cannot just sit back and assume that because the net is fairly free now, it always will be. Eternal vigiliance is the price.
also WorlfOfEnds (Score:2)
Re:Lessig said it first (Score:2)
As long as I can send IP packets between my computer and yours, we still will be able to communicate much as is done today. The value of this is great enough that large numbers of people will do it. Even if it takes new implementations of
Re:Lessig said it first (Score:2)
That is what may happen. The US Government is already working on getting protocol-analyzers ("Carnivore") installed at major ISPs. Once those are in place and happily scanning all POP3+HTTP, we might expect the feds will discourage the use of formats they can't read, and suggest ISPs block encrypted streams.
As long as I can send IP packets between my computer and yours, we still will be able to communicate m
Re:Lessig said it first (Score:2)
(yes, access to all but a small number of incoming ports to my lan is firewalled by me, but that's for security and it is my choice - I run servers, clients and do what the hell I like, and any ISP that would stop me doesn't get a penny of my money)
Re:Lessig said it first (Score:2)
I'm at work. My company makes custom TCP/IP applications, and over the past 20 years our customers have become increasingly inconvienced that we can no longer connect to them directly.
(It would be a fatal security risk for the Windows(tm) systems that may exist in the LAN)
any ISP that would stop me doesn't get a penny of my money
Which ISP is that, exactly? I've been through the website
Re:Lessig said it first (Score:2)
Re:Lessig said it first (Score:2)
It's true that my selection of ports is more restrictive than average. However, by a big preponderance, the typical (US) internet user is not able to accept incoming connections.
If you add together all the AOL people, all the college students, all the corporate deskjockeys, and everyone on Comcast, AT&T, Verizon, Time-Warner, and RCN... well, that's much more than half of all people on the internet. E
Re:Lessig said it first (Score:2)
The market will settle out into those who want unfettered access, and the masses who do not.
As long as those who want outbound connections remain vocal, and are willing to litigate for their free speech rights, they will have them, as will we all by dint of their efforts.
The price of freedom is eternal vigilance. No one said it would be a cake walk.
Re:Lessig said it first (Score:3, Insightful)
You think they don't already? Or rather, can't?
If your packet goes over someone else's wire, that person can do *anything* to that packet they want to. There is you, on one of the wire, sending electrical signals out that represent data -- there is nothing at all that mandates the electrical signals they send back have to be what you want them to be.
Honestly, if you would not believe this:
# traceroute my.server.com
Tracing ro
Re:Lessig said it first (Score:2)
Back to the old skool, anyone? Let's set up some dedicated modem links. Or, cache the data for future transfer and then in a predetermined time window have our modems connect and perform a data transfer. Ugly shit ;)
The Internet (which had government, and now much commercial backing) changed all this because we suddenly had reliable data networks over which to send all our data. N
Re:Lessig said it first (Score:2)
"He's got a modem! Open fire, it must be a terrorist! Why else would he not use our beautiful Citizen's Internet, unless he has something to hide"
But seriously, in the long run (15+ years), they won't even have to ban modems. You won't have phone lines anymore, except things that run use VoIP. Sonic analysis and natural-language processors will be able to detect if those VoIP packets contain data inconsistent with verbal communication (even if computers can't
Re:Lessig said it first (Score:2)
Sonic analysis and natural-language processors will be able to detect if those VoIP packets contain data inconsistent with verbal communication
Not just a few people at my workplace make noises that are so inconsistent with verbal communication.
Re:Lessig said it first (Score:2)
Now there are a few technical reasons why the internet CANNOT be retrofitted into pay-as-you-go content restricted affair. For starters, the overhead required to properly meter internet packets would degrade performance to the point of uselessness. The cost of metering the in
Re:Lessig said it first (Score:3, Interesting)
I think that Walker's article does a good job at refuting those supposed technical reasons. If you can point out specifically how he's mistaken, please do so. The question of whether or not something is "techincally impossible" is always a difficult one, and the pattern throughout history is that something deemed "impossible" by one generation is achieved by the next.
The cost of me
Re:Lessig said it first (Score:2)
"The Institute for Public Policy Research (IPPR) today released a report recommending the introduction of a national road-charging system for the UK, most likely using satellite technology."
Or how about this proposal in Oregon;
(http://www.washingtondispatch.com/cgi-bi n/artman/ exec/view.cgi/22/6154)
"Oregon's Road User Fee Task Force (what a
Re:Lessig said it first (Score:2)
Side channels. There's no way to tell if the poker hand I describe in an email is real or if it's part of a encrypted message [schneier.com].
Re:Lessig said it first (Score:2)
That could work a little, as might the general class of steganographic tricky.
But Walker already addressed that point [fourmilab.ch] just fine. Basically, they can make it so hard to evade the controls that the end result is indistinguishable from perfect control, even though 0.0001% of people can sneak around it for occasional small messages.
Re:Lessig said it first (Score:2)
In the meantime the Blue Chicken flies at Midnight.
Re:Lessig said it first-Metered packets. (Score:2)
What results is a regulatory nightmare. You see with water, natural gas, electricity, even phone calls there is a finite quantity to b
Freedom without repsonsibility (Score:2, Interesting)
There is an additional price though, responsiblity.
Unlimited freedom without repsonsibility is equivalent to anarchy, and the net is as close to a functional implementation of anarchy that the world has seen. However, this does not imply that what we have is an ideal. Far from it in fact.
Spam is one immediately obvious result of this freedom. Giv
Re:Freedom without repsonsibility (Score:2)
But I like anarchy!
Re:Freedom without repsonsibility (Score:2)
Since none of us possess "unlimited freedom," or ever will, this is a completely irrelevant observation.
I leave the hardest issue for the reader, how do we encourage those who threaten our freedoms with their irresponsible behaviours to behave responsibly?
"Irresponsible behaviors" do not threaten freedom. "Irresponsible behaviors" is nanny-state code for "That guy over there is doing something with his freedom that annoys me, so make
Re:Lessig said it first (Score:2)
The reason is not technological, but economic. Already most people with internet access are restricted to "consumer" usage, meaning they can open connections to others, but not wait for others to connect to them (run a server).
ISPs have a strong incentive to divide internet use into separate categories, for stronger price-discriminating power. It may always be possible to buy "premium, unfiltered" internet access, but the additional cost could be
Re:Lessig said it first (Score:2)
There's more to it than that and it's actually quite devious. Remember that telcos, cable networks are all ultimately related to content providers. These are big companies with arms that reach everywhere (think AOL/Time-Warner) and they have traditionally made their money by selling content to consumers. Pay attention to this part: The Internet threatens the traditional model, because it a
Re:Lessig said it first (Score:2)
Re:Lessig said it first (Score:2)
Even the 'solid hosted sites' are insufficient for those that want to do more than 'run a web site'. For plain web space, yes we will always have this. But neither of the options you provided give the same flexibility as running your own site off your own connection. For instance, short of a co-location, what com
Re:Lessig said it first (Score:2)
Re:Lessig said it first (Score:2)
That's already a rather pessimistic viewpoint. Acquiesed already, really. Saddam's Iraq was a still a dictatorship, even though handfulls of rebels could whisper together in the shadows.
But the creation of undergrounds is a human-resources problem; it depends on like-minded people finding each other and then going off to exchange their hidden knowledge. Until one of them can share crypto techniques with the other, they have no
Re:Lessig said it first (Score:2)
Five or ten years is a long time. There might be some non-DRM competetion to Intel/AMD [theinquirer.net] by then.
Re:Same false information about Trusted Computing (Score:2)
That's just not how Trusted Computing works. You can copy all you want, it's decrypting that is made harder.
And, if you can't decrypt the data (say, after a system crash), what difference does it make to have it at all?
Wrong again. That's just not how it works
This is Microsoft we're talking about. Of course it will work this way.
Fast-Forward (Score:2)
Actually, it was quite easy to read the whole thing...
Once you know the trick
Far longer than my attention span... (Score:2)
Re:Far longer than my attention span... (Score:2)
Just a guess (Score:3, Funny)
So I'm guessing that it has positive things to say about trusted computing
Remember... (Score:3, Interesting)
My feeling is the idea of trusted computing isn't in itself bad. As a matter of fact, there's probably a lot of very good uses for it to go along with a larger system of security. Some of the ideas in Palladium, if used correctly, really could enhance and improve security. It, in itself, may not provide security, but as part of a larger system with other security geatures, it may well be useful.
The problem is not trusted computing, but some of these rogue interests. The government, Microsoft, the recording industry, the motion picture industry, and just about everyone else wants a say in where it's going. Hopefully, between the various interests will cancel each other out and we'll end up with the good that comes from trusted computing, but without most of the bad.
Groups fighting against trusted computing shouldn't fight the technology, in my opinion, but some of the uses of it. This means they should fight some of the DRM aspects of it, not the technology in general. Remember, an extra layer of security isn't a bad thing to have.
Re:Remember... (Score:2)
Re:Remember... (Score:2)
They don't do that, so you can be sure they want it for DRM and for DRM only.
Re:Remember... (Score:2)
shouldn't fight the technology, in my opinion, but some of the uses of it.
Yes, but some of the nefarious uses for TCPM will be put into place only because the implementation of the technology is permitted. It's the camel getting its nose under the tent.
Imagine a rollout of IE 7.0 on Windows with built-in mechanisms for authentication based on your hardware. Initially, no big deal. Then, later, some of your favorite websites start returning errors because they can't "authenticate you". Most people will
Imminent Death Of The Net Predicted (Score:3, Informative)
Re:Imminent Death Of The Net Predicted (Score:2)
But it's funniest when Bob Metcalf does it.
He makes some good points (Score:2)
He states at the begining of the article that he sees the internet as a genie that has been set free and that with said genie free all things are posible. When he tells us how he could put this genie back into the bottle he is p
On just the Firewall problem. (Score:2)
I can confirm the firewall problem. The high schools in the country where I live do not have library catalog servers. I wanted to get a sample server up and running, and maybe let them start using it to record their books.
Of course, I had a firewalled ISP. I went ahead and asked them to get me connected with IPCHAINS to
Re:On just the Firewall problem. (Score:2)
Projects like the one you describe are why the following exist:
stunnel
vtun
ssh
openvpn
http proxies
etc.
ONE of those should have solved the problem for you...
what's the deal with all the prejudgments lately (Score:2)
we're all big boys and girls here (well, never enough girls, sigh). i'm sure the article is wonderful, but i would prefer to see either a more insightful comment on the posting or none at all.
Trolling (Score:2)
Do we really need a warning to protect our fragile view of the world?
Just post it with a quick, brief summary of his points and drop the dramatics/trollish statements.
misconception of trust? (Score:2)
He says "users are also protected against corruption of data on their own computers". I haven't seen anywhere any account of how 'trusted computing' would actually improve reliability.
The most it appears to promise, is simply to block any material that the 'trust' mechanism diagnoses to be unreliable.
If that's right, then it sounds as if
Trusted...riiight..... (Score:2)
There is an simple lesson to be learned, one that has been repeated countless times over our history... People rebel.
In an economic system it is much easier to "rebel": some competitor will come along that will not employ "trusted computing", perhaps a company like Apple or a flavor of Linux will force their inferior competitor (perhaps Mi
Re:Trusted...riiight..... (Score:2)
Haven't these Slashdotters that are bemoaning an imagined advocacy ever RTFA? Consider this quote:
He is not observing, he is biased. (Score:2)
He may very well be right, but his argument fails to see opposing arguments (which IMPLIES advocacy) - He does not talk about the trusted computing initiative failing in the future, and because you were probably already convinced that copy protection will be the next big thing you failed to see his bias.
Re:Trusted...riiight..... (Score:2)
EVERYONE participates in the economy. Consumers, producers, observers. Everyone.
I say this to make a point: trusted computings new attention is the result of free market economics, not something against the grain. In this case, the need in the economy was b
Re:Trusted...riiight..... (Score:2)
So the businesses use dollars. Then, if you want to buy the business' products, you have to pay dollars.
When the government requires that its departments (Pentagon) and contractors use M$ Palladium (or other "trusted computing"), then its customers will require it. When that happens, then the change will be forced. If
Re:Trusted...riiight..... (Score:2)
Looking at his Speak Freely website... (Score:2)
It mostly revolves around his contention that NAT'd LANs block peer to peer traffic. However, while he does concede that you can do port mapping to overcome this issue, he doesn't give people credence to make it work.
I have to call bullshit on this one; all you need to do is set up your network with static IPs on all of your machines, and then set up your firewall to pass traffic to specifi
Re:Looking at his Speak Freely website... (Score:2)
It mostly revolves around his contention that NAT'd LANs block peer to peer traffic. However, while he does concede that you can do port mapping to overcome this issue, he doesn't give people credence to make it work.
Well that sort of thing certainly is NOT plug and play. It's quite reasonable to say that it's *well* beyond the capabilities of more than 90% of the people on the net.
But y
Spontaneous organization of the 'net??? (Score:2)
Hmmm... The computers were sitting there waiting for the Internet, so they could spontaneously organize?
The aroma of that argument reminds me a bit of Haldane soup [ox.ac.uk].
Trusted computing? Trust yourself [bobdylan.com].
He Fails on the History of Technology (Score:2, Interesting)
Gloom, Doom, and Reality (Score:4, Insightful)
Take Digital Rights Management, for instance. People put up with it for a little while, until they try to listen to their songs on something other than their own computer -- then they suddenly realize that DRM in fact sucks donkey ass.
Buying a Palladium-enabled computer will be like buying a car with a top speed of 65 miles per hour. The fact is, everyone bends the law a little bit from time to time
When Joe User runs into stupid problems like "Error! This computer sucks and therefore refuses to play this music file" or "Error! This computer sucks and refuses to allow you to install this program", he'll start getting pissy. He'll tell his friends not to buy any of these "trusted" computers, and pretty soon, everyone's buying computers and software that don't have this sort of crap built in.
This of course won't stop big companies and big government from trying to restrict things, but the chance that they'll succeed is actually fairly small. I don't see DRM ever completely dissappearing from the radar, but I'm gussing that it'll remain what it is right now -- an annoyance.
Re:Gloom, Doom, and Reality (Score:2)
Re:Gloom, Doom, and Reality (Score:2)
Instead it'll 'social engineer' and say things like "Error! This music file comes from an untrusted source and could contain a virus that could damage your computer."
Re:Gloom, Doom, and Reality (Score:2)
I want to buy a legal DVD player that lets me skip over the FBI warning; where can I get one? I was able to record my laser disks onto my VCR, but I can't buy a legal DVD player that will let me do that. Yet, I was willing to switch to copy-protected
Re:Gloom, Doom, and Reality (Score:2)
What we can *hope* instead is that people will refuse to buy the programs that lock things down. But do remember that this is a hope, not a certainty, people do lots of stupid things. E.g., even though the RIAA and the MPAA are conspiring with congress to take away their rights, many slashdot readers still purchase CDs and watch mov
what's the big hangup here anyway? well...lots.... (Score:3, Insightful)
I buy most/all of my software (okay...maybe not M$ Office, but I buy all my games), I don't write viruses, and it should make spam a trivial non-issue.
Blah, blah, blah
However, I am in TOTAL agreement with everyone here that TC is a bad idea in "The Implementation", especially in the (over?) paranoid forecasts in its use.
My computer won't run unsigned software - no more viruses
My computer won't run unsigned software - any publisher can create subscriptions (overpriced ones, at that) and revoke the license 10 times a year
My computer won't open unsigned documents - the macros in the spreadsheet won't crash my computer
My computer won't open unsigned documents - this person has written op-ed columns against BigBadCorporation Inc, and they've revoked that person's software certificate so they can't send anything else
We could all go on and on - however, he says in the top of the article that he's not for it! What he says is basically a "Watch out for these kinds of words and messages from your legistators! These are the words with which they will woo you into consent!"
There is no problem that has a magic bullet. Every decision has good and bad, and I'm firmly convinced that the bad with DRM and TC has little to do with the proposed concept, but with a very foreseeable result and that it grossly outweighs the good.
Information used to be passed word-of-mouth, and evolved to cave paintings, the written text, the printing press, etc. etc. etc. and now the Internet as we know it. There is money to be made in keeping the spread of information in a one-to-many structure - scads and scads of cash - and with that as the primary (if not single!) motivation for those implementing DRM, as well as the politicians they influence, we the consumers will fall into the backdrop as a minor inconvenience.
traitors (Score:2)
Trusted? (Score:2)
I trust it not to compute.
I'm sorry. I have a cold.
Spyware (Score:2)
Article is a bit off base in places (Score:2)
I managed to RTFA (most of it, anyway), and I think he's off base in a few areas. For example, he uses firewalling as one part of the liberty-eroding equation, but doesn't seem to realize these two facts:
Re:Article is a bit off base in places (Score:2)
2. Most users don't care about running their own website.
He realized that fact, and stated it exactly [fourmilab.ch]:
"In any case, the key lesson of the mass introduction of NAT is that it demonstrates, in a real world test, that the vast majority of Internet users do not notice and do not care that their access to the full range of Internet services and ability to act as a peer of any other Internet site has been restricted."
Re:Article is a bit off base in places (Score:2)
If you read carefully, you will see that he doesn't mention things like firewalling and NAT as things that were specifically produced to erode freedom. They both came about for viable reasons but their implementation is the problem, particularly when tied to the many other developments cited - some of which are specifically intended to hurt users for the benefit of corporations and other bastards.
Also, indicating that most people don't want to setup or run web pages is not relevant. What is relevant, an
A simple way to pay for content (Score:2)
Instead, imagine if the ISP's drove the process. You've already got a billing relationship with them,
I THINK JOHN WALKER FOUND THE COMPLAINT GENERATOR (Score:2)
What I hate most about this article... (Score:2)
The patent and copyright system (Score:2)
Tivo and crucial consumer awareness (Score:2)
way to pesemistic, and heres why (Score:2)
That is simply false and not true to history. For example, it is a good thing that the letter U is not owned by anybody. It is not a matter of a fair and equitable price, even if the royality is one one millionth of a cent, it would be unjust. It is not a matter of who created it, or what their incentive is - and a failure to understand such is a failure
Trusted Computer Means More Freedom? (Score:2)
Right now, the Internet stifles artists because writers have a medium that does not allow them to collect money for their content. Anyone can copy a web page or even an ebook.
But, if there was a mechanism for safely charging for web content, then, suddenly a real independent publishing would emerge. The makers of the trusted software would want everyone to buy it, so, everyone would become or could become a trusted document author.
I used to be in favor of anonymity on the Internet. Now, I'm dead agains
The term "trusted" is accurate for this. (Score:3, Insightful)
You need to look further down on the list of definitions "trust" to find the appropriate one:
"A combination of firms or corporations for the purpose of reducing competition and controlling prices throughout a business or an industry."
Re:Trusted? (Score:3, Insightful)
"You're just going to have to trust me"
Re:My thoughts exactly! (Score:2)
Then you must be a prognathous pithecanthropoid knuckle-typer!
obFilesharers of the Carribbean quote (Score:2)
Elizabeth: I want you to leave and never come back.
Barbossa: I'm disinclined to acquiesce to your request. Means "no"!
Return to the Dark Ages (Score:2)
Re:One Possible Partial Answer (Score:2)
That's how AIM works! (Score:2)
Let's see, a central server, users connect to exchange addresses, they talk peer to peer.
Re:Constitutional Right to Privacy (Score:2)
Except there is no constitutonal right to privacy (Score:2, Insightful)
Re:Except there is no constitutonal right to priva (Score:2)
It does exist and is the basis for several rights. Without privacy as a defacto Consitutional right, there is NO reasonable basis to "being secure in their persons" or "protected from illegal search and seizure". If you have no privacy, there can be no objection to me or anyone else searching through your life for whatever reason strikes my fancy (curiosity). Same for government. If you have no right to privacy, there can be no argument against me or anyone else violating the "security of your person" (
You misunderstand (Score:2)
"There is also no Right to Bear Arms, per se"
It is referred to explicitly: a right to keep and bear arms. Not so with privacy.
"I have found that most people who like to say there is no Constitutional right to privacy use this as code to say:"
Shows the kind of mistakes you make when you put words into someone's mouth and judge them on what you wish they said instead of what they said. As for me, you could not be more wrong
Anonymous voting (Score:2)
Hmm... Non-anonymous Internet + Internet Voting == Non-anonymous Voting. Eeep!
Re:Whee. More NAT bashing... (Score:2)
However, what I think he's objecting to comes down to ISP-level firewalls, out of control of the end user. I won't stand for that, but I'm afraid that he's right--it's likely to happen, and most people won't even notice it.
Re:Look at the source ... (Score:2)
The blurb above totally misrepresents the intentions of the author, which are quite clear from the introductory paragraphs.
The article is about why that stuff is bad and how it can be used to restrict freedoms.
Re:Not flamebait (Score:2)
Say, open-source CAD anyone?
Re:Don't worry, folks (Score:2)
=========
Re:fp (Score:2)