Trusted Computing: Difference between revisions

Content deleted Content added
"TC reminds me of ..." is unencyclopedic; just state what it does/is (including criticisms)
Aim for encyclopedia, not tract
Line 88:
 
=== Users don't control their applications ===
If a user upgrades hisher computer, sealed storage could prevent himher from moving all his music files to histhe new computer, forcing him to buy all the songs again. It could also enforce spyware, with music files only given to users whose machines attest that they willto telltelling the artist or record company every time the song is played. In a similar vein, a news magazine could require that to download their news articles, a user's machine would need to attest to using a specific reader. The mandated reader software could then be programmed not to allow viewing of original news stories to which changes had been made on the magazine's website. Such "newest version" enforcement would allow the magazine to "rewrite history" by changing or deleting articles. Even if a user saved the original article on his computer, the software might refuse to view it once a change had been announced.
 
TC opponents are alarmed at the prospect of these technologies being used as a form of remote control. For example, a newsmagazine could make it such that in order to download their news articles, one would need to attest that they use MS Reader. MS Reader could be programmed so as not to allow viewing of their news stories without asking the magazine's website if a change has been made. This could allow the magazine's editors to "rewrite history" by changing or deleting certain articles. Even if a user saved the original article on his computer, the software could refuse to let it be viewed once a change had been announced.
 
=== Loss of Internet Anonymity ===