Deeplinks Blog posts about Trusted Computing
You might be asking yourself that question, if you've been following our series on Microsoft's trusted computing and DRM strategies. No Microsoft customer wants DRM-crippled operating systems, hardware, and video content.
Hollywood, on the other hand, wants ubiquitous DRM. And, wielding DRM and the DMCA, major movie studios can shut Microsoft out of the lucrative digital video market if it doesn't play ball. In that game, consumers will inevitably lose.
Hollywood is saying, loudly and to anyone who will listen, "unless we get content protection that satisfies us, our next-gen high-definition video will not be on your platform." Since there are only a handful of major studios who control 90%+ of commercially important film and TV content, this kind of cartel threat is relatively credible.
Edward Felten has an extraordinary post detailing how Microsoft is giving Hollywood explicit veto power over the functionality of the upcoming Windows Vista operating system (formerly known as Longhorn). How explicit? Check out this excerpt from the Microsoft white paper:
"Other companies are free to invent their own [encryption for outputting video content] ... but security considerations mean that there is a high bar to meet before a new cipher can be approved for use....
The evidence must be presented to Hollywood and other content owners, and they must agree that it provides the required level of security. Written proof from at least three of the major Hollywood studios is required."
Staff Technologist Seth Schoen, EFF's resident expert on trusted computing, recently attended this year's Windows Hardware Engineering Conference (WinHEC). This is the final post in a four-part series in which Schoen provides detailed updates on the status of Microsoft's security and lockware strategies for Windows. The outcome of these strategies will affect to what degree people using the platform and "trusted" PCs can maintain a desirable level of control over their own computers. Previous posts can be found here, here, and here.
Staff Technologist Seth Schoen, EFF's resident expert on trusted computing, recently attended this year's Windows Hardware Engineering Conference (WinHEC). This is the third of a four-part series in which Schoen provides detailed updates on the status of Microsoft's security and lockware strategies for Windows. The outcome of these strategies will affect to what degree people using the platform and "trusted" PCs can maintain a desirable level of control over their own computers. The first two posts can be found here and here.
*****
Staff Technologist Seth Schoen, EFF's resident expert on trusted computing, recently attended this year's Windows Hardware Engineering Conference (WinHEC). This is the second of a four-part series in which Schoen provides detailed updates on the status of Microsoft's security and lockware strategies for Windows. The outcome of these strategies will affect to what degree people using the platform and "trusted" PCs can maintain a desirable level of control over their own computers. The first post in the series can be found here.
*****
Pages
Subscribe to EFF Updates
Deeplinks Archives
Deeplinks Topics
- Analog Hole
- Anonymity
- Anti-Counterfeiting Trade Agreement
- Biometrics
- Bloggers Under Fire
- Bloggers' Rights
- Broadcast Flag
- Broadcasting Treaty
- CALEA
- CDA 230
- Cell Tracking
- Coders' Rights Project
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- CyberSLAPP
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA
- DMCA Rulemaking
- Do Not Track
- DRM
- E-Voting Rights
- EFF Europe
- EFF Software Projects
- FAQs for Lodsys Targets
- File Sharing
- FOIA
- Free Speech
- FTAA
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- Innovation
- Intellectual Property
- International
- International Privacy Standards
- Internet Blacklist Legislation
- Internet Governance Forum
- Locational Privacy
- Mandatory Data Retention
- Mass Surveillance Technologies
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- OECD
- Online Behavioral Tracking
- Patent Busting Project
- Patent Trolls
- Patents
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Printers
- Privacy
- Reading Accessibility
- Real ID
- RFID
- Search Engines
- Search Incident to Arrest
- Security
- Social Networks
- Terms Of (Ab)Use
- Test Your ISP
- The Global Network Initiative
- Trans-Pacific Partnership Agreement
- Transparency
- Travel Screening
- Trusted Computing
- Uncategorized
- Video Games
- Wikileaks
- WIPO
- Broadcast Flag