InvestorsHub Logo
Followers 86
Posts 6674
Boards Moderated 0
Alias Born 07/23/2003

Re: Whitewash post# 74773

Wednesday, 03/23/2005 7:02:17 PM

Wednesday, March 23, 2005 7:02:17 PM

Post# of 249545
Whitewash--A Slashdot TCG basher AGREES with us! A consensus of THREE must mean we're on to something! Right? lol!

"Cisco's Business Ready Data Center Initiative press release [cisco.com] says:
Cisco is collaborating with industry-leading technology, system integration and support partners including EDS, HP, IBM, Intel and Microsoft, to enable integrated solutions to be offered to joint customers. Collaboration efforts will include sharing of best practices, alignment of architectures

Alignment of architectures - that would be the new Trusted Computing architecture.

And they are working with EDS, HP, IBM, Intel and Microsoft. HP, IBM, Intel and Microsoft were four of the five Trusted Computing Group's founding members. But who the hell is EDS? Why they have been selected To Operate Root Key Certificate Authority [wave.com] for Trusted Computing. That's a press release from Wave Systems, another member of the Trusted Computing Group. Teir EMBASSY system was the Trusted Computing system before it was named Trusted Computing."





http://slashdot.org/articles/04/04/30/0313254.shtml?tid=136&tid=137&tid=187




TRUSTED COMPUTING (Score:5, Interesting)
by Alsee (515537) on Friday April 30, @04:48AM (#9016911)
(http://slashdot.org/)
http://slashdot.org/articles/04/04/30/0313254.shtml?tid=136&tid=137&tid=187


This is NOT excellent. It is a TRUSTED COMPUTING system.

If you check IBM's Tivoli whitepaper, [ibm.com] the top page states right off the bat that it is an "identity management system". Page 7 states that is is based on "tamper-resistant, non-bypassable trusted computing bases (TCBs)".

If we look at Cisco's BUSINESS READY DATA CENTER Security Overview and head down to the Trust and Identity Management [cisco.com] section we see Cisco Network Admission Control (NAC) ... relegates noncompliant and potentially vulnerable systems to environments with limited or no network access. Noncompliant endpoints can be denied access, placed in quarantine, or given restricted access. The main NAC page explains that NAC only permits connections to "compliant and trusted endpoint devices". Trusted Computing devices running approved software.

Cisco's Business Ready Data Center Initiative press release [cisco.com] says:
Cisco is collaborating with industry-leading technology, system integration and support partners including EDS, HP, IBM, Intel and Microsoft, to enable integrated solutions to be offered to joint customers. Collaboration efforts will include sharing of best practices, alignment of architectures

Alignment of architectures - that would be the new Trusted Computing architecture.

And they are working with EDS, HP, IBM, Intel and Microsoft. HP, IBM, Intel and Microsoft were four of the five Trusted Computing Group's founding members. But who the hell is EDS? Why they have been selected To Operate Root Key Certificate Authority [wave.com] for Trusted Computing. That's a press release from Wave Systems, another member of the Trusted Computing Group. Teir EMBASSY system was the Trusted Computing system before it was named Trusted Computing.

The initial Trusted Computing deployment will look like a GoodThing. Its security features will be used for the benefit of companies deploying it, and there is no infrastructure in place yet to abuse the system. But fundamentally Trusted Computing is designed to be secure against the owner. Once a signifigant number of desktop computers include Trust chips that anti-owner "security" is going to turn into a nightmare. If you computer is not "compliant and trusted" and running approved software then these Business Ready Data Centers may deny you access. Websites will start refusing you access. New software will refuse to instal. And in about 4 or 5 years, ISPs may start installing Cisco's Network Admission Control routers. At that point you will be denied internet access unless you have a "compliant and trusted" system. Then Trusted Computing is no longer "optional". You can't switch it off and opt out. Then you no longer own your computer.

Oh, and if anyone doubts that ISPs would ever instal such routers that deny you internet access, may I point you to another slashdot story Cisco Working to Block Viruses at the Router. [slashdot.org] Even Slashdot missed the story that these are Trusted Computing routers. They are being pitched as a GODD THING. They don't actually block virues. What they do is make sure you have a Trusted Computer, then they can use the Trust system to ensure that you are running (or not running) any software they want to require you to run (or that they forbid you to run). In particular they could check that you operating system has the latest patches and that you are running an approved virus scanner, thus the claim that they fight viruses.





WAVEs EMBASSY = THE COMMON DENOMINATOR "SWISS" DEFACTO PLATFORM FOR TRUSTED WEB SERVICES

Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.