SUBSIM Radio Room Forums



SUBSIM: The Web's #1 resource for all submarine & naval simulations since 1997

Go Back   SUBSIM Radio Room Forums > General > General Topics
Forget password? Reset here

Reply
 
Thread Tools Display Modes
Old 05-26-06, 10:14 AM   #1
VON_CAPO
Samurai Navy
 
Join Date: May 2005
Posts: 588
Downloads: 0
Uploads: 0
Default Can you trust your computer?

From: http://www.gnu.org/philosophy/can-you-trust.html

Too long to read, but, it worth it.

"Who should your computer take its orders from? Most people think their computers should obey them, not obey someone else. With a plan they call "trusted computing", large media corporations (including the movie companies and record companies), together with computer companies such as Microsoft and Intel, are planning to make your computer obey them instead of you. (Microsoft's version of this scheme is called "Palladium".) Proprietary programs have included malicious features before, but this plan would make it universal.

Proprietary software means, fundamentally, that you don't control what it does; you can't study the source code, or change it. It's not surprising that clever businessmen find ways to use their control to put you at a disadvantage. Microsoft has done this several times: one version of Windows was designed to report to Microsoft all the software on your hard disk; a recent "security" upgrade in Windows Media Player required users to agree to new restrictions. But Microsoft is not alone: the KaZaa music-sharing software is designed so that KaZaa's business partner can rent out the use of your computer to their clients. These malicious features are often secret, but even once you know about them it is hard to remove them, since you don't have the source code.

In the past, these were isolated incidents. "Trusted computing" would make it pervasive. "Treacherous computing" is a more appropriate name, because the plan is designed to make sure your computer will systematically disobey you. In fact, it is designed to stop your computer from functioning as a general-purpose computer. Every operation may require explicit permission.

The technical idea underlying treacherous computing is that the computer includes a digital encryption and signature device, and the keys are kept secret from you. Proprietary programs will use this device to control which other programs you can run, which documents or data you can access, and what programs you can pass them to. These programs will continually download new authorization rules through the Internet, and impose those rules automatically on your work. If you don't allow your computer to obtain the new rules periodically from the Internet, some capabilities will automatically cease to function.

Of course, Hollywood and the record companies plan to use treacherous computing for "DRM" (Digital Restrictions Management), so that downloaded videos and music can be played only on one specified computer. Sharing will be entirely impossible, at least using the authorized files that you would get from those companies. You, the public, ought to have both the freedom and the ability to share these things. (I expect that someone will find a way to produce unencrypted versions, and to upload and share them, so DRM will not entirely succeed, but that is no excuse for the system.)

Making sharing impossible is bad enough, but it gets worse. There are plans to use the same facility for email and documents--resulting in email that disappears in two weeks, or documents that can only be read on the computers in one company.

Imagine if you get an email from your boss telling you to do something that you think is risky; a month later, when it backfires, you can't use the email to show that the decision was not yours. "Getting it in writing" doesn't protect you when the order is written in disappearing ink.

Imagine if you get an email from your boss stating a policy that is illegal or morally outrageous, such as to shred your company's audit documents, or to allow a dangerous threat to your country to move forward unchecked. Today you can send this to a reporter and expose the activity. With treacherous computing, the reporter won't be able to read the document; her computer will refuse to obey her. Treacherous computing becomes a paradise for corruption.

Word processors such as Microsoft Word could use treacherous computing when they save your documents, to make sure no competing word processors can read them. Today we must figure out the secrets of Word format by laborious experiments in order to make free word processors read Word documents. If Word encrypts documents using treacherous computing when saving them, the free software community won't have a chance of developing software to read them--and if we could, such programs might even be forbidden by the Digital Millennium Copyright Act.

Programs that use treacherous computing will continually download new authorization rules through the Internet, and impose those rules automatically on your work. If Microsoft, or the US government, does not like what you said in a document you wrote, they could post new instructions telling all computers to refuse to let anyone read that document. Each computer would obey when it downloads the new instructions. Your writing would be subject to 1984-style retroactive erasure. You might be unable to read it yourself.

You might think you can find out what nasty things a treacherous computing application does, study how painful they are, and decide whether to accept them. It would be short-sighted and foolish to accept, but the point is that the deal you think you are making won't stand still. Once you come to depend on using the program, you are hooked and they know it; then they can change the deal. Some applications will automatically download upgrades that will do something different--and they won't give you a choice about whether to upgrade.

Today you can avoid being restricted by proprietary software by not using it. If you run GNU/Linux or another free operating system, and if you avoid installing proprietary applications on it, then you are in charge of what your computer does. If a free program has a malicious feature, other developers in the community will take it out, and you can use the corrected version. You can also run free application programs and tools on non-free operating systems; this falls short of fully giving you freedom, but many users do it.

Treacherous computing puts the existence of free operating systems and free applications at risk, because you may not be able to run them at all. Some versions of treacherous computing would require the operating system to be specifically authorized by a particular company. Free operating systems could not be installed. Some versions of treacherous computing would require every program to be specifically authorized by the operating system developer. You could not run free applications on such a system. If you did figure out how, and told someone, that could be a crime.

There are proposals already for US laws that would require all computers to support treacherous computing, and to prohibit connecting old computers to the Internet. The CBDTPA (we call it the Consume But Don't Try Programming Act) is one of them. But even if they don't legally force you to switch to treacherous computing, the pressure to accept it may be enormous. Today people often use Word format for communication, although this causes several sorts of problems (see "We Can Put an End to Word Attachments"). If only a treacherous computing machine can read the latest Word documents, many people will switch to it, if they view the situation only in terms of individual action (take it or leave it). To oppose treacherous computing, we must join together and confront the situation as a collective choice.

For further information about treacherous computing, see <http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html>.

To block treacherous computing will require large numbers of citizens to organize. We need your help! The Electronic Frontier Foundation and Public Knowledge are campaigning against treacherous computing, and so is the FSF-sponsored Digital Speech Project. Please visit these Web sites so you can sign up to support their work.

You can also help by writing to the public affairs offices of Intel, IBM, HP/Compaq, or anyone you have bought a computer from, explaining that you don't want to be pressured to buy "trusted" computing systems so you don't want them to produce any. This can bring consumer power to bear. If you do this on your own, please send copies of your letters to the organizations above.
Postscripts

1. The GNU Project distributes the GNU Privacy Guard, a program that implements public-key encryption and digital signatures, which you can use to send secure and private email. It is useful to explore how GPG differs from treacherous computing, and see what makes one helpful and the other so dangerous.

When someone uses GPG to send you an encrypted document, and you use GPG to decode it, the result is an unencrypted document that you can read, forward, copy, and even re-encrypt to send it securely to someone else. A treacherous computing application would let you read the words on the screen, but would not let you produce an unencrypted document that you could use in other ways. GPG, a free software package, makes security features available to the users; they use it. Treacherous computing is designed to impose restrictions on the users; it uses them.
2. Microsoft presents palladium as a security measure, and claims that it will protect against viruses, but this claim is evidently false. A presentation by Microsoft Research in October 2002 stated that one of the specifications of palladium is that existing operating systems and applications will continue to run; therefore, viruses will continue to be able to do all the things that they can do today.

When Microsoft speaks of "security" in connection with palladium, they do not mean what we normally mean by that word: protecting your machine from things you do not want. They mean protecting your copies of data on your machine from access by you in ways others do not want. A slide in the presentation listed several types of secrets palladium could be used to keep, including "third party secrets" and "user secrets"--but it put "user secrets" in quotation marks, recognizing that this somewhat of an absurdity in the context of palladium.

The presentation made frequent use of other terms that we frequently associate with the context of security, such as "attack", "malicious code", "spoofing", as well as "trusted". None of them means what it normally means. "Attack" doesn't mean someone trying to hurt you, it means you trying to copy music. "Malicious code" means code installed by you to do what someone else doesn't want your machine to do. "Spoofing" doesn't mean someone fooling you, it means you fooling palladium. And so on.
3. A previous statement by the palladium developers stated the basic premise that whoever developed or collected information should have total control of how you use it. This would represent a revolutionary overturn of past ideas of ethics and of the legal system, and create an unprecedented system of control. The specific problems of these systems are no accident; they result from the basic goal. It is the goal we must reject."

:hmm: :hmm: :hmm:
VON_CAPO is offline   Reply With Quote
Old 05-26-06, 10:34 AM   #2
STEED
Lucky Jack
 
Join Date: Jan 2006
Location: Down Town UK
Posts: 27,695
Downloads: 89
Uploads: 48


Default

Here we go one for the conspiracy lobby.
__________________
Dr Who rest in peace 1963-2017.

To borrow Davros saying...I NAME YOU CHIBNALL THE DESTROYER OF DR WHO YOU KILLED IT!
STEED is offline   Reply With Quote
Old 05-26-06, 10:35 AM   #3
GreyOctober
Sonar Guy
 
Join Date: Apr 2006
Location: Bucharest, Romania
Posts: 394
Downloads: 30
Uploads: 0
Default

Quote:
Originally Posted by STEED
Here we go one for the conspiracy lobby.
Ill take it from here gentlemen..thank you :P
__________________
GreyOctober is offline   Reply With Quote
Old 05-26-06, 10:37 AM   #4
STEED
Lucky Jack
 
Join Date: Jan 2006
Location: Down Town UK
Posts: 27,695
Downloads: 89
Uploads: 48


Default

Quote:
Originally Posted by GreyOctober
Quote:
Originally Posted by STEED
Here we go one for the conspiracy lobby.
Ill take it from here gentlemen..thank you :P
Go ahead I am sitting here waiting for a good laugh.
__________________
Dr Who rest in peace 1963-2017.

To borrow Davros saying...I NAME YOU CHIBNALL THE DESTROYER OF DR WHO YOU KILLED IT!
STEED is offline   Reply With Quote
Old 05-26-06, 10:55 AM   #5
GreyOctober
Sonar Guy
 
Join Date: Apr 2006
Location: Bucharest, Romania
Posts: 394
Downloads: 30
Uploads: 0
Default

The data submitted is now classified and taken away fro further analysis. Ill be issuing my T H E O R I E S next year, along with a heafty file and lawsuit agains Microsoft. :rotfl:
__________________
GreyOctober is offline   Reply With Quote
Old 05-26-06, 11:24 AM   #6
Sailor Steve
Stowaway
 
Posts: n/a
Downloads:
Uploads:
Default

It's okay; after spending a year monitoring my activities, they'll all die of boredom.

Or of laughter.

Either way, they'll be dead.
  Reply With Quote
Old 05-26-06, 11:24 AM   #7
Wildcat
Engineer
 
Join Date: Jan 2002
Posts: 215
Downloads: 69
Uploads: 0
Default

There is a simple solution, use linux with emulators. Problem solved. I do not use windows for ANY secure information exchange at all. Suicide IMO. Microsoft's built a nice stable gaming platform in XP and that's about it.
Wildcat is offline   Reply With Quote
Old 05-26-06, 11:47 AM   #8
VON_CAPO
Samurai Navy
 
Join Date: May 2005
Posts: 588
Downloads: 0
Uploads: 0
Default

Quote:
Originally Posted by Wildcat
There is a simple solution, use linux with emulators. Problem solved. I do not use windows for ANY secure information exchange at all. Suicide IMO. Microsoft's built a nice stable gaming platform in XP and that's about it.
I agree.
My first machine is Linux.

And I have the second one with Windows XP, totally isolated from the internet. ---> No connection at all.

I made this change a month ago, and I am a very happy user.

All the software is Open Source, it had been checked over and over again by thousands of users, bit by bit. So, no nasty surprises or code with hidden features.

That is the reason why Linux is solid rock.

And I am sure that you do not know... almost every software in Windows has a equivalent one in Linux, of course, FREE. (Many of them have a Windows version)

3D Studio Max = Blender
Photoshop = Gimp
M$ Office = Open Office
etc, etc, etc.......

By the way, if any moderator or owner from Subsim site want to remember me that I am connecting with WinXP, I would like to manifest that my browser is sending a string simulating to be XP. You can see that checking your traffic stats.
VON_CAPO is offline   Reply With Quote
Old 05-26-06, 02:08 PM   #9
Excalibur Bane
XO
 
Join Date: Oct 2005
Posts: 429
Downloads: 20
Uploads: 0
Default

I never trust me computer. I've caught it on more then one occasion plotting to kill me. Skynet has nothing on this little, sadistic baby. You turn your back for five seconds on this menace and you'll end up with a USB cable in the back!
__________________
Looking for a list of mods for SH4? Everything you need is here: List Of Modifications for SH4 v1.3

"The only thing necessary for evil to triumph, is for good men to do nothing."
Excalibur Bane is offline   Reply With Quote
Old 05-26-06, 02:09 PM   #10
SUBMAN1
Rear Admiral
 
Join Date: Apr 2005
Posts: 11,866
Downloads: 0
Uploads: 0
Default

Gentoo rulez!

ANyway, Linux is all fine an dandy until Congress make Palladium mandatory.

-S
__________________
SUBMAN1 is offline   Reply With Quote
Old 05-26-06, 02:29 PM   #11
VON_CAPO
Samurai Navy
 
Join Date: May 2005
Posts: 588
Downloads: 0
Uploads: 0
Default

Quote:
Originally Posted by SUBMAN1
Gentoo rulez!

ANyway, Linux is all fine an dandy until Congress make Palladium mandatory.
-S
What is Palladium:

From: http://www.epic.org/privacy/consumer...palladium.html

"""In June 2002, Microsoft released information regarding its new "Palladium" initiative. Palladium is a system that combines software and hardware controls to create a "trusted" computing platform. In doing so, it would establish an unprecedented level of control over users and their computers.

Palladium could place Microsoft as the gatekeeper of identification and authentication. Additionally, systems embedded in both software and hardware would control access to content, thereby creating ubiquitous Digital Rights Management schemes that can track users and control use of media. Microsoft expects to have elements of the system in place by 2004. """

Trusted Computing' Frequently Asked Questions: http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html


Welcome Fahrenheit 451
VON_CAPO is offline   Reply With Quote
Old 05-26-06, 02:33 PM   #12
Wildcat
Engineer
 
Join Date: Jan 2002
Posts: 215
Downloads: 69
Uploads: 0
Default

that will never happen to linux, linux is not a product of an american company so congress can whine and moan all it wants, we will always know what's going on inside linux and its programs.
Wildcat is offline   Reply With Quote
Old 05-26-06, 02:49 PM   #13
STEED
Lucky Jack
 
Join Date: Jan 2006
Location: Down Town UK
Posts: 27,695
Downloads: 89
Uploads: 48


Default

Quote:
Originally Posted by Excalibur Bane
I never trust me computer. I've caught it on more then one occasion plotting to kill me.!
__________________
Dr Who rest in peace 1963-2017.

To borrow Davros saying...I NAME YOU CHIBNALL THE DESTROYER OF DR WHO YOU KILLED IT!
STEED is offline   Reply With Quote
Old 05-26-06, 03:08 PM   #14
VON_CAPO
Samurai Navy
 
Join Date: May 2005
Posts: 588
Downloads: 0
Uploads: 0
Default

Quote:
Originally Posted by Wildcat
that will never happen to linux, linux is not a product of an american company so congress can whine and moan all it wants, we will always know what's going on inside linux and its programs.
I hope you are right.

But you know what?

Step 1: The shutting down of the analog TV waves by March 2007. Everybody will must to stick to a digital provider. ---> We will not be anymore passive and anonymous. And of course, everybody will pay without exception.

Step 2: Do you remember the Pentium III, it was designed to broadcast its serial number in each internet connection.
It would not be estrange in a near future that if you do not have a "watchdog" installed, your connection would be refused.

:hmm: :hmm: :hmm:
VON_CAPO is offline   Reply With Quote
Old 05-26-06, 03:14 PM   #15
VipertheSniper
Ace of the Deep
 
Join Date: Sep 2002
Location: Austria
Posts: 1,070
Downloads: 0
Uploads: 0
Default

Who really thinks this can happen? I guess no company's IT security-guy will let his company switch to computers that will use this sort of thing. I've read about it I think 2 years ago, and so far nothing has happened. I can't remember everything, but what I remember is that the article I've read mentioned that the FBI, CIA and M$ will hold some kind of universal keys, so they could in theory read all documents all over the world... In the hands of greedy and mighty bastards this cries out to be abused for industrial espionage and what not.
They won't succeed with their plan, they'd loose too much customers.
VipertheSniper is offline   Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -5. The time now is 05:30 AM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Copyright © 1995- 2025 Subsim®
"Subsim" is a registered trademark, all rights reserved.