Stanford CIS

tcblog

Blog

Catching up

Over the last few months, I have been very busy with other projects, and so I couldn't follow the TC discussions very closely. But I hope this will change o…

Blog

DRM/TC Conference in Berlin next January

Together with Professor Pamela Samuelson from Berkeley and some colleagues from Germany and the U.K., I am currently co-organizing a large conference on digital…

Blog

The German Government on TCG and NGSCB

After some public and non-public hearings held last year in Germany, the German government, more particular the German ministries of the Interior and of Economi…

Blog

The Future of Microsoft NGSCB

After first rumors have appeared that Microsoft is cancelling NGSCB, the official story currently seams to be that Microsoft is reworking substantial parts of N…

Blog

"Interesting Uses of Trusted Computing"

An anonymous blogger has posted a very interesting list of potential areas where TC might be helpful. While I agree with most of the text, I just want to raise…

Blog

Comment Spam

I am sorry for all the comment spam that floods my (and other) blogs. However, this problem will be solved in a few weeks with an update of Movable Type at the…

Blog

Article 29 Working Party Report

The Article 29 Data Protection Working Party, which is an independent European advisory body on data protection and privacy under the European Data Protection D…

Blog

Owner Override IV

There are also areas outside trusted computing where something like an owner override feature already exists. Some web browsers (such as Safari, Opera, and Konq…

Blog

Owner Override and Distributed Computing

I have written before about the advantages and disadvantages of including an owner override feature into trusted computing architectures. In the earlier posting…