Blog-a-thon tag:
EFF15 More good publication news today: Dan Miller has agreed to publish my letter to
Macworld. It's about "Trusted Computing," which has not even been discussed in the pages of MacWorld.
I knew something about Digital Rights Management last summer when I went to Budapest for the 2-week seminar,
Intellectual Property in Comparative Perspective. Then
Cory Doctorow started talking.
In one 2-hour lecture, Cory taught us the fundamentals of encryption principles, explained how Digital Rights Management (DRM) could never serve as truly effective encryption, and illustrated how DRM erodes our electronic freedoms. He moved quickly to a lesson on Trusted Computing (TC). Cory insists that TC could be really good for everybody, so long as the user always maintains the final say.
Of course, the odds that Microsoft will voluntarily implement TC in a way that relinguishes that control are just a bit this side of me winning Miss America. I've been worried ever since that, even compared to the rest of the copyright debate, this is a really obscure topic with wideranging dystopian implications that will happen before anybody knows what hit them. But I keep talking to people. And rather than simply blogging about it (esp. since Nelson Pavlosky is perhaps my entire audience to date), I used the news that Apple would switch to Intel processors as a chance to try to land something in a major national mag.
It worked. Here is my letter to the editor, exactly as Miller intends to publish it:
Your Intel story missed one very scary issue: trusted computing. Just before Jobs made the big announcement, Intel (quietly) announced that it would begin producing chips that implement “trusted computing” (TC). If you don’t know about TC yet, you need to learn about it now. One good way to do so: go to the Electronic Frontier Foundation’s Web site (www.eff.org) and do a search on “trusted computing.” If, as part of the switch to Intel, Apple implements TC in such a way that users lose control of their computers, our collective digital freedom will be in serious danger.
Here is the P.S. I tacked on, including several reference links:
P.S. Yes, I am an EFF member. But I am a student-level donor, not an operative. EFF per se had nothing to do with the shameless plug, and I’ll understand if you pull the URL. If, on the other hand, you’d like to refer your readers to other awesome resources, I’d suggest (non-exclusively):
http://hybernaut.com/intel-tc
http://slashdot.org/article.pl?sid=05/05/28/1718200
http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
The full EFF article that I cite above is available at:
http://www.eff.org/Infrastructure/trusted_computing/20031001_tc.php
P.P.S. Love your mag.
Learned of this just in time to contribute to EFF's Blog-A-Thon.