Trusted Computing: Difference between revisions

Content deleted Content added
Line 94:
 
TC opponents, including [[Richard Stallman]] [http://www.gnu.org/philosophy/can-you-trust.html], find this prospect and other aspects of TC reminscent of George Orwell's ''[[Nineteen Eighty-Four|1984]]'', where the government changed everything ever archived to make it seem as though their predictions were always correct.
 
=== Loss of Internet Anonymity ===
 
Because a TC-equipped computer is able to uniquely attest to its own identity, it will be possible for vendors and others who possess the ability to use the attestation feature to zero-in on the identity of the user of that computer with a high degree of certainty.
 
Such a capability is contingent on the reasonable chance that the user at some time provides user-identifying information,
whether voluntarily or indirectly. One common way that information can be obtained and linked is when a user registers a computer just after purchase. Another common way is when a user provides identifying information to the website of an affiliate of the vendor.
 
As more advanced identification technologies such as biometrics and RFID become widespread, it is expected that computer users will be identified with still greater certainty, and that ever increasing amounts of information will be available about them. While many believe that online purchases and credit transactions could potentially be more secure as a result of the remote attestation capability, this may cause the computer user to lose a reasonable expectation of anonymity when using the internet.
 
Critics point out that this could have a chilling effect on political free speech, the ability of journalists to use anonymous sources, whistleblowing, political blogging and other areas where the public has traditionally enjoyed protection from retaliation through anonymity.
 
=== Proposed owner override for TC ===