Treacherous Computing, or Trusted Computing?

My longtime readers (both of them) will know that I’ve written quite a bit about Intellectual Property and specifically about the fascist technological infrastructure known variously as Trusted Computing, Treacherous Computing, TCPA, Palladium et al.

In my most famous piece of writing 2 years ago, I wrote:

When “Trusted Computing” is widely implemented and adopted — a process that is hardly guaranteed, depending on popular awareness and the mobility of opposition to it — central control of every machine that connects to the Internet will be a reality. An infrastructure of control will be in place to enforce the increasingly strict intellectual property laws being passed.

As you can see, at the time I was somewhat optimistic that popular resistance could possibly alter plans of Intel and other corporations involved in this scheme to stop it. Well, my optimism didn’t pan out.

It turns out that Intel has now added this infrastructure directly into their CPU chips. This means that from this generation of chips forward (until it is changed), it may not be possible to purchase a computer without this draconian infrastructure of social control already in place.

From the article:

Microsoft and the entertainment industry’s holy grail of controlling copyright through the motherboard has moved a step closer with Intel Corp. now embedding digital rights management within in its latest dual-core processor Pentium D and accompanying 945 chipset.

And so it begins… if you are purchasing a computer soon, don’t get this chipset. And if you are on the fence, thinking you may purchase a computer relatively soon, you should definitely get one now that is NOT using this technology.

Leave a Reply