InvestorsHub Logo
icon url

helpfulbacteria

05/24/10 11:44 AM

#193978 RE: New Wave #193975

There are so many factors one must weigh…

· Just as we all have acknowledged the superiority of hardware-based trust over software-based approaches, we have to look at the flipside: a hardware-based breach or vulnerability could prove quite damaging and go undetected. A bit of caution is not a bad thing.
· The NSA is now in the ascendancy re: cyber security and computer network defense topics.
· A 2007 report basically made the case that trusted computing would have to wait for (in essence, though they did not use the words) “trusted execution” before being adopted within .gov/.mil.
· In or around late 2007, it became obvious that even the best, most commonly used, commercially available technologies were not enough to protect secrets within the Defense Industrial Base. This prompted the creation of the CNCI… and, subsequently, the highly classified Enduring Security Framework…which takes public/private collaboration to a whole new level.
· The comparatively recent Google breach served as yet another reminder of just how vulnerable “we” are to the Advanced Persistent Threat.
· Paradigm shifts (a term that is appropriate in this context, though vastly overused) don’t happen overnight. Entrenched commercial interests do what they can to throw rocks in the road… or, maybe, even to cut off access to financing so as to strangle a development-stage company. (Some day, the story of how the equities markets can be used for “commercial warfare” will be written. The Israelis certainly know a lot about this. I have no idea whether or not this happened to Wave.)
· If one can accurately answer this question, “Why have PC OEMs continued to include TPMs even though less than 1% have been turned on?”… you’re doubtless very smart and will have another key to the labyrinth.
· The irony… or, more aptly, AN irony of all of this is that government (which, of course, includes its extended ecosystem including the Defense Industrial Base) will prove itself to be the leading force for trusted computing. This comes as no surprise to those of who’ve studied the origins of Steve Walker’s Orange Book… or NetTop… Intel’s first sighting working with General Dynamics according to a long-forgotten German link… or any of the other steps along the way. (Hi, Awk.) We couldn’t imagine it any other way, especially given the pervasive nature of the threat. But… what with the tendency to see government as an innovation backwater… there’s a big ole chunk of irony.

Best Regards,

c m