Feeds

Son of CPRM fails ATA committee vote

Will it be driven underground?

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

The proposal dubbed 'Son of CPRM' has failed to make it into the ATA hard drive specification. The results of a postal vote are published today. The T.13 committee actually voted 8:7 in favour of including Curtis Stevens' 'Proposal to Support Generic Functionality' [19kb, PDF] with three formal abstentions. But the vote failed to make the required two-thirds majority of eligible organisations, four of which failed to vote.

The roll call is as follows:

Representatives from IBM, Toshiba (4C members), Hitachi, Iomega, Microsoft, Phoenix, Absolute Software, and Circuit Assembly voted aye. Apple, Adaptec, ST Micro, Western Digital, Maxtor, LSI Logic, and independent consultant Hale Landis voted no. Fujitsu, Marvell and Qlogic formally abstained. And CMD, Pacific Digital and Dell must have got lost on the way to the post office, or the cat ate the forms: they didn't register a vote or a formal absention.

Of course, Curtis Stevens' proposal doesn't say anything about CPRM as such, and has divided opinion among copyright control watchers. The EFF's John Gilmore sees it as a smokescreen for CPRM, a view encouraged by the simultaneous withdrawal of CPRM at the last T.13 meeting in February.

On the other hand, Linux IDE guy Andre Hedrick, who sits on the T.13 committee but was ineligible to vote because of a job-change, argues that campaigners could be driving CPRM underground into the many private, secret vendor unique command sets.

"Control over a technology is more important than it existing," he told The Register in February. "If you know it's there, you're empowered."

Whether Hedrick goes nuclear, and releases his command parser, remains to be seen. The parser will bounce all undocumented, vendor commands it encounters, including many used to give vendors performance advantages. ®

Related Stories

The Register's CPRM Coverage

Remote control for virtualized desktops

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.