Words of Advice:
"If Something Seems To Be Too Good To Be True, It's Best To Shoot It, Just In Case." -- Fiona Glenanne
“The Mob takes the Fifth. If you’re innocent, why are you taking the Fifth Amendment?” -- The TOFF *
"Foreign Relations Boil Down to Two Things: Talking With People or Killing Them." -- Unknown
“Speed is a poor substitute for accuracy.” -- Real, no-shit, fortune from a fortune cookie
"Thou Shalt Get Sidetracked by Bullshit, Every Goddamned Time." -- The Ghoul
"If you believe that you are talking to G-d, you can justify anything.” — my Dad
"Colt .45s; putting bad guys in the ground since 1873." -- Unknown
"Stay Strapped or Get Clapped." -- probably not Mr. Rogers
"The Dildo of Karma rarely comes lubed." -- Unknown
"Eck!" -- George the Cat
* "TOFF" = Treasonous Orange Fat Fuck,
"FOFF" = Felonious Old Fat Fuck,
"COFF" = Convicted Old Felonious Fool,
A/K/A Commandante (or Cadet) Bone Spurs,
A/K/A El Caudillo de Mar-a-Lago, A/K/A the Asset,
A/K/A P01135809, A/K/A Dementia Donnie, A/K/A Felon^34,
A/K/A Dolt-45, A/K/A Don Snoreleone
2 comments:
100% *not* true. I've had some dealings with the Trusted Computing infrastructure, we had to get Linux working with it, including getting a GRUB bootloader signed so it'd run on TPM-based motherboards. There is no -- zero -- mechanism in there that would allow remote control by unauthorized parties. The closest that could possibly do so would be the Intel EFI standard, which calls for a DOS-like boot loader operating system that could potentially be given networking capabilities, but note that EFI predates Windows 8 by at least five years and in fact has been used on every Intel-based Apple computer ever made.
The trusted computer infrastructure basically just provides a means of cryptographically signing binaries so viruses won't run on your computer. That's all it does. There is a public key embedded in your BIOS and if the binary was signed by anything other than Microsoft's private key, it won't run. There's good reasons for the German government to not use Windows 8 -- for one thing, it means they have to send their internal top secret software written by their equivalent of the NSA to Microsoft to get it signed before they can run it on Windows 8 computers, meaning that they could potentially leak government secrets to Microsoft (and thus the NSA) -- but the notion of Microsoft or the NSA having "remote control" isn't one of those reasons.
- Badtux the Silicon Valley Penguin
Tux - - I wish the hell I understood what you are talking about (before I clicked on comments, I knew it was yours) - Cheers.
Post a Comment