If you are not familiar with the terms "Trusted Computing" (TC) and "DRM" (Digital Rights Management), I ask that you take some time to become familiar with them. Once you do, I believe you will share a sense of urgency. You will find the necessary links to do so herein. We will take just a moment and outline the problem and suggest some directions for protecting ourselves from this technology.
Many of us have been confused by the terms. Some of us believe that they are both a version of the same thing. Not so. While DRM is fairly straightforward in its purpose and application, Trusted Computing tends to muddy the water a bit. The links provided here will take you to good information on each concept. Once you read the entire article you will come to the same conclusions most other techno-geeks have .
The combination of DRM and Trusted computing will result in the Hardware Conglomerate and Microsoft virtually owning your computer. If you have read the MS Windows or Office EULA's, you know that you never do actually own the software you purchase from them. You are simply acquiring a license from them to use it.
By allowing Trusted Computing and DRM to be activated or built into your computer, you are stating that the software maker and the hardware manufacturer can do whatever their individual EULA's state they can do. Just as in the software realm, if you do not agree to "the terms" of the EULA, the software cannot be installed. If you refuse to allow the DRM and TC to function on your computer, the components such as the cpu, video card, sound card and ethernet card will cease to function.
First some definitions:
digital rights management - http://www.answers.com/topic/digital...ement?method=6
trusted computing - http://www.answers.com/main/ntquery?...mputing&gwp=16
Sounds good so far? Read on...
The Trusted Platform Module Ė Creating a Safe Public Space or a DRM Nightmare? http://www.chillingeffects.org/weath...?WeatherID=534
Now commentary on the Intel solution:
Intel to cut Linux out of the legitimate content market http://theinquirer.net/?article=24638
Oh and as you know, it isn't just software as noted in the article above. Read this on the hardware aspects.
Intelís VIIV, Microsoft Vista, satisfying unbridled greed? http://www.hardwareanalysis.com/content/article/1811/
All of this is being done under the guise of Your security. Not all of the ideas are bad. There are legitimate uses for these technologies. The problem is, You aren't going to be given a choice.
"No big deal", you say; "I will just buy a Linux computer with hardware that is not affected."
Very quietly, with the most stealth possible, these corporations are lobbying Congress to write legislation to make this law. Don't laugh, it is happening as we speak. Here is the bottom line.
Once these laws are passed, the damage will be done. Computer manufacturers, hardware manufacturers and software makers all legally force their way into your computer and you have no choice in the matter. It will be illegal to operate a computer without these "safeguards".
You will not be able to send anyone email, files...your isp may not allow you onto the internet via their network. Why? Because you are not "trusted". The data on your computer cannot be "verified" as "safe" for the rest of the computers, so you are denied access to all of it.