Trusted Computing Platform basically hands control of all your documents, software, I/O devices and peripherals over to a "responsible" company. Somebody had the audacity to initially explain it as follows at it got be thinking about 2 years later.
QUOTE |
Imagine a paedophile has taken some images of children and posted them to the internet. Sure, identified sites can be closed down, but only after other perverts have downloaded and copied them. With this new system each file has an unique originator code and can be traced, even after the file has been copied and renamed. Once the paedophiles unqiue ID has been recovered from the file, this can be broadcast to every computer within the TCP environment to delete every file that has the ID code. Even if the images are kept off-line, as soon as the computer is on-line the files will be deleted. With TCP only accepting TCP compliant hardware, hackers can also have their equipment traced and then shut-down remotely. |