Trusted Computing: Difference between revisions

Content deleted Content added
Drawbacks: Spelling correction: Crytographer -> Cryptographer
Line 64:
Opponents of trusted computing argue that the security features that protect computers from viruses and attackers also restrict the actions of their owners. This makes new [[Coercive monopoly|anti-competitive]] techniques possible, potentially hurting people who buy trusted computers.
 
Cambridge CrytographerCryptographer [[Ross Anderson]] has concerns that "TC can support remote censorship. In general, digital objects created using TC systems remain under the control of their creators, rather than under the control of the person who owns the machine on which they happen to be stored (as at present). So someone who writes a paper that a court decides is defamatory can be compelled to censor it—and the software company that wrote the word processor could be ordered to do the deletion if she refuses. Given such possibilities, we can expect TC to be used to suppress . . . writings that criticise political leaders."
He goes on to state that: