View Single Post
Old 04-25-2005, 07:15 PM   #2
hacker
Technology Mercenary
hacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with others
 
hacker's Avatar
 
Posts: 617
Karma: 2561
Join Date: Feb 2003
Location: East Lyme, CT
Device: Direct Neural Implant
Quote:
Originally Posted by BobR
This may increase security, but it seems that it will also shift the control of security. Not clear what that would mean for freedoms of users to control their data and applications. One advantage is that your sensitive data may remain secure even if the computer is booted from someone an alternative boot drive, like a jump drive.
How is this any different from the "Microsoft Activation" scam? If you lose control of your data, you have to call them to get it back. If their chip has a flaw (and it will, or someone will find a way around it; Microsoft doesn't exactly employ intelligent security experts), you are forced to upgrade hardware to get the fix.

No thanks, stay away from this, far far away.
hacker is offline   Reply With Quote