Feeds

Intel, MS, other names face fresh privacy row

Can you trust your PC?

  • alert
  • submit to reddit

High performance access to file storage

A trade consortium led by Intel, Microsoft, IBM and a bevy of other big PC names is quietly working behind the scenes to produce a "trusted computing platform alliance" which is set to re-ignite civil liberty concerns about computer privacy. The alliance, which includes 70 or so big names in the industry, and which has a Web site here, wants to develop a spec to deliver "enhanced hardware and OS based trusted computing platform that enhances customers' trusted domains". The Trusted Computing Platform Alliance (TCPA) was formed towards the end of last year to virtually no fanfare, and its members have to sign non-disclosure agreements to learn more about the plans. According to sources close to the organisation, the initial specifications are close to release. The organisation says in one of the documents on its site that, as conventional businesses become e-businesses, trustworthiness of PCs "must continue to improve". But that led one observer, who declined to be named, to say: "Doesn't this sound exactly what the music industry, Hollywood and software-licensing monopolists might like? "Furthermore, where does this leave Open Source software, small PC hardware manufacturers and enthusiasts? Modify your PC in the 'wrong' way, and suddenly the Web is closed to you. OK, so Red Hat could get a certificate for their build of a Linux kernel, but suddenly something as common as recompiling the kernel, or using kernel modules is impossible." Intel faced a barrage of complaints from end users and corporations when it released its Pentium III processor, which has a personal serial number (PSN) and which was initially switched on by default. The subsequent protests led it to change its stance, and while the chips still have the PSN, it is now switched off by default. Other members of the trade organisation include Compaq, HP, AMD, 3Com and Baltimore. ®

Top three mobile application threats

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.