My own take on the trusted computing debate
My paper "The Present and Future of Digital Rights Management - Musings on Emerging Legal Problems" has just been published in a DRM book in Springer&…
My paper "The Present and Future of Digital Rights Management - Musings on Emerging Legal Problems" has just been published in a DRM book in Springer&…
On November 5, the Trusted Computing Group announced the release of TCG TPM 1.2 at the RSA conference in Amsterdam. From a legal and policy perspective, TCG 1.2…
Many observers have pointed out that TC architectures might be used by application, service and content providers to define which client applications to interop…
As Ed Felten recently wrote in IEEE Security & Privacy May/June 2003, 60, 61: "In fact, the direct effects of TC are relatively harmless. It is the ind…
Intel has posted a draft of its LaGrande Technology Policy on Owner/User Choice and Control, and welcomes comments until the end of this year. While I like many…
I am trying to collect some information about trusted computing architectures such as TCG and Microsoft's NGSCB. I am particularly interested in their legal…