Microsoft Stalling TCG Best Practices Document? 163
It doesn't come easy writes "Bruce Schneier (of Counterpane Internet Security) suspects Microsoft doesn't want the recently Trusted Computing Group published best practices document: Design, Implementation, and Usage Principles for TPM-Based Platforms to apply to Vista. The reasons are mostly speculation at the moment but Bruce implies further investigation will be forthcoming..."
No lasting effect. (Score:5, Interesting)
This will yet more incentive to move to a system which has been properly designed, from scratch, to be safe.
As has happened before, the other members of the group will go ahead with their design based off of a draft of the document - generation 1 has a few interoperability issues because each member interpreted the draft differently but at least there will be something out there which everyone, except MS, is trying their best to follow.
TCG Bashing? (Score:3, Interesting)
Just a guess (Score:4, Interesting)
Re:The DRM factor. (Score:5, Interesting)
Apple's DRM is simple and consistant unlike MSFT's which change per song. Apple has sold over a half a billion dollars worth of songs. The rest combined barely equal a tenth of that.
If you have to have DRM it has to be consistant and easy to use, and actually have rights not just restrictions.
Re:Fishy? No, deceptive and devious! (Score:5, Interesting)
One section of Microsoft is trying to find a way to diversify into other fields (as it always has been). This means as soon as anything gets popular, instantly releasing that they will have a competitor to that product. See previous articles..
The next section of Microsoft is designing Vista. More or less, they're looking over at Apple and saying "hmm, now how do we do this for ourselves". Hey, if you're going to copy, make sure you copy from the best.
Next, Microsoft's patent team is doing everything they can to churn out as many patents for as many things as possible, no matter what relevance they have to anything. Patents are the new gold; having them makes you rich, no matter in what shape, color, or form.
Then you have the Microsoft gaming committee putting together the XBox 360.. Good luck with that xboxers.
And then you end up with the "future of technology" department; the one where they write all of these magnificent things, designing things like Palladium and giving them crazy names. The only problem is, while this section's doing the designing, all of the other sections of Microsoft are doing their own thing; it seems as if there isn't any communication in the entire process.
Microsoft is like a three hundred pound kid on a tricycle on a very big hill. They've got a lot of business henged on a small amount of products, and they've got to ensure that these products don't collaspe. And the best way of doing that is Advertising, the media, product placement, and the public (get the picture yet? good). The more of these documents coming out that don't mean anything at all, the more Microsoft looks like it's doing something.
Some notes (Score:5, Interesting)
"Security: ...The reporting mechanism should be fully under the owner's control. "
"Privacy: ...designed and implemented with privacy in mind "
"Interoperability: ...should not introduce any new interoperability obstacles that are not for the purpose of security. "
"Controllability: Each owner should have effective choice and control... their participation must be opt-in. "
Why should MS rewrite all of their business practices based on what their competitors suggest?
I'm not saying that TGP is a bad idea... I'm saying that it is a bad idea for MS.
Aluminum Foil Beanie Mode (Score:3, Interesting)
Who is the "owner?" (Score:5, Interesting)
Think of it this way: most computer-related "stuff" now has a "licensed, not sold" tag attached. Ask yourself again, then, who has ultimate control unter TCG definitions.
Lawful intercept. (Score:1, Interesting)
Oh please. Don't get fooled. This is just sucker bait, and you're swallowing it.
If it is optional now, it won't be in the future. The way things have always worked is that "lawful intercept" occurs in the next generation of the products.
It's been this way with just about EVERY new technology of interest that has come along. First with the phone system, then with the internet, routers/switches, and they are currently trying to do it with VOIP.
Computers are just the next thing on this list.
I give it in place by 2010, max.
Re:File Protection (Score:3, Interesting)
Writers of malicious software are always several dozen steps ahead of the average consumer by nature. They will figure out how to circumvent the TC implementations and then use those very restrictions to prevent the users from diagnosing and removing them.
In a sick sort of way this may be economically profitable for companies who write security software. But the whole system is definitely not in the best interest of society.