Feeds

Future encrypted chips could handcuff end users

Cyber Rights group demands public scrutiny

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Report A UK-based organisation has called on chip manufacturers to allow public scrutiny of their future plans to allow owners of PCs control of their systems. Cyber-Rights and Cyber-Liberties UK said that future microprocessors might include the ability to carry out cryptographic processes that could prevent applications from running unless signed with the correct cryptographic key. But, warns the group, while such features could provide benefits, such as virus protection and for corporations to ensure only the software they had authories were run, there are dangers in this approach too. The authors of the report warn that users would not know such chips were reliable, and would also want to know who is controlling such features. If manufacturers, such as Intel, determine whose signature can validate a software program, PC owners are denied the right to manage their own systems. Users may also want to write their own programs or run programs written by developers who don't have an agreement with chip manufacturers, the report says. There are also reliability problems, the authors say. "If signing processes are to built into chips, or if chips are to run encrypted code, we need owner control of them and also publicly accountable scrutiny of the way the technical and procedural mechanisms work," the report says. More details can be found here ®

Remote control for virtualized desktops

More from The Register

next story
BIG FAT Lies: Porky Pies about obesity
What really shortens lives? Reading this sort of crap in the papers
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?