Share this page | Email | Contact Us

Special Report on

EFF Position on Trusted Computing

eff position on trusted computing special research report Photo by
in which they present evidence that certificate authorities (CAs) may be cooperating with government agencies to help them spy undetected on "secure" encrypted communications. (EFF sometimes advises Soghoian on responsible disclosure issues, including for this paper.) More details and reporting are available at Wired today . The draft paper includes marketing materials from Packet Forensics , an Arizona company, which suggests that government "users have the ability to import a copy of any legitimate keys they obtain (potentially by court order)" into Packet Forensics products in order to impersonate sites ...
and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The strategies and methodologies of computer security often differ from most other computer technologies ...
EFF: Breaking News
Washington, DC - After receiving hundreds of requests from Americans asking to know what personal information the government has obtained about them, the Transportation Security Administration (TSA) told passengers that it "does not have the capability to perform a simple computer-based search" to locate individual records. TSA revealed last fall that it would use private passenger data from all domestic airline flights taken in June of 2004 to test its troubled "Secure Flight" passenger-screening system. In response to a fruitless Privacy Act request by four Alaska residents, the Electronic Frontier ... market research, surveys and trends
should i donate to eff again?
As soon as Bush was re-elected, I immediately joined the EFF. Now, nearly a year later, I have to make the decision as to whether or not I should effectively re-up my membership. Unfortunately, this is proving to be a difficult decision. While, the EFF supports a bunch of causes that I believe in strongly, they are taking a number of positions that seem disingenuous. Worse, it appears that the EFF is practicing the same fear-mongering of the likes of Fox News or CNN. That is, blowing things way out of proportion to gain more eyeballs and, hopefully, more monetary support. I was hoping the EFF was above that. For example, ... market research, surveys and trends

[This document came from the Progress and Freedom Foundation,] June 1996 THE COMPUTER REVOLUTION, ENCRYPTION AND TRUE THREATS TO NATIONAL SECURITY by G. A. Keyworth, II, and David E. Colton, Esq. * Americans take it for granted that when they a send package via first class mail its contents are protected. We do not worry that someone will open our envelopes and take our checking or credit card account numbers, read our personal letters, or steal our business ideas. Yet our privacy could be threatened as we move to a digital ... industry trends, business articles and survey research
Myth/Facts about Retroactive Immunity and Attorneys | Electronic ...
presenting numerous myths about trial attorneys as part of the Administration's desperate plea to get retroactive immunity for its telecommunications partners. MS. PERINO: [Telecommunications companies] have the technology, they have the means, and they want to cooperate, but they have been burdened with over 40 lawsuits, class-action lawsuits that would -- that, one, already are costing them lots of money to deal with. And if the suits were to go forward, it could cost them possibly billions. And that cost is going to be borne by the consumers of those businesses, the customers of those businesses. ... Q Dana, critics ... industry trends, business articles and survey research


This puts the user into a sufficiently weak position that the ... From a user's perspective, using trusted computing on cellular phones has two opposing effects . .... EFF comments on TCG design, implementation and usage principles. ... technology research, surveys study and trend statistics
Presentation Title
Jun 27, 2008 ... Critical to control position, size and magnetic sigma ..... From Thibadeau, R. “ Trusted Computing for Disk Drives and Other Peripherals” ... technology research, surveys study and trend statistics
Economic Incentives for - Darknets, DRM, and Trusted Computing ...
Bergemann, Feigenbaum, Shenker, and Smith (2004) present a position paper with the first attempt ..... “Trusted Computing: Promise and Risk.” EFF, 2003. ...
Slashdot | When Should Children Be Introduced to Computers?
You laugh. A friend of mine had his son banging on the keyboard at roughly 6 months, and understanding the connection between mouse movements and cursor movement by about 18 months. Kid is a serious UT2004 opponent at the ripe old age of 5, starts the game and connects to a good server on his own. Give them technology as soon as they can handle it without breaking it...or if the break it it's fixable, or doesn't matter. My father sent me to work programming in basic from textbooks when I was 4. I found this a wonderful thing, as I could make the computer do what I wanted. I learned syntax and other important elements ...