Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
User Journal

Journal N3Roaster's Journal: With Trusted Computing, the Terrorists Win

Trusted Computing (TC) cannot be allowed to become a reality unless it can be easily bypassed with no loss of functionality (in other words, TC must fail due to infeasibility or poor design). I say this not because I want a choice in what I do with my computer. I say this not because I believe that I should be able to do anything I want with bits stored on my hard drive and in my RAM. I say this because if TC emerges in the way its backers envision, it will become a powerful and unstopable tool in the terrorist arsenal.

A major selling point for TC is its potential use in Digital Rights Management (DRM). The idea of DRM is that the distributor of digital content such as movies, music, and books, can provide rules for how that information can and (more importantly) cannot be used. It is a technological solution to the social problem of copyright infringement. That DRM can also trample on fair use provisions of copyright and is potentially inflexible to changes in legislation is beside the point. A TC DRM solution gives media distributors the ability to decide which programs are trusted to restrict what a user is able to do with that media.

Furthermore, TC can be used to enforce software that is used on a subscription model. It allows software to determine if its subscription is current and if it is not, the software no longer runs. Again, this can be used to prevent people from infringing on the copyright of software companies.

This is a potentially powerful and enabling tool for companies of all sizes and the potential for new markets it brings can only be imagined at this stage, but it comes at a prohibitively high cost.

A terrorist network would be able to distribute its plans and correspondence much more effectively and with no chance of interception by law enforcement and intelligence agencies. Terrorists would be able to ensure that any material used in planning an attack could only be viewed with a registered copy of Terrorscape. Copies of Terrorscape that might fall into the hands of law enforcement could be remotely disabled within the terrorist network. Worse, this software could, rather than simply fail to work, provide vast quantities of detailed misinformation to strain the ability of nation states to provide security against these false threats, weakening their enemy without need for an attack at all.

Governments, including the government of the United States of America, are actively pursuing this technology because they see the potential benefits without being made aware of serious danger it poses to free and democratic societies. The advantages this technology provides to terrorist and organized criminal organizations cannot be overlooked.

If you value a free and democratic society, I urge you to write your representatives in government and make them aware of the extreme risk in allowing the development of trusted computing. TC must be banned and continued development halted because if TC becomes a reality, the terrorists win.

This discussion has been archived. No new comments can be posted.

With Trusted Computing, the Terrorists Win

Comments Filter:

Two can Live as Cheaply as One for Half as Long. -- Howard Kandel

Working...