Originally posted by: soccerballtux
Originally posted by: WackyDan
Well then you are bit on the crazy side of things aren't you?
Lol, right, if you say so.
A company's assets are their's to control, not the end user. With or without TPM I can keep people out of a file, or off a system, the TPM makes it even more difficult to crack, and allows a level of security that software alone can't provide.
When it comes to conspiracy theories, I tend not to subscibe, as very few of you ever can debate any rational aspect of what you are claiming.
You don't seem like someone very capable of rational reasoning. Perhaps its time to end this conversation. You're blindly proclaiming the benefits of NGSCB, but haven't shown they can provide anything of value(besides more power and money for those who control it [like yourself]) that a software solution can't. I've presented a very real case in which the TPM is used to cover up and destroy evidence of corporate exploit. It has happened in the past, and those at fault were caught. What you are proposing would ensure the same would take place, but would never come to light, let alone be retributed. What you are proposing is lunacy.
Again, I've worked with this technology since it's arrival, but nothing I can say here to you or anyone like you will change your way of thinking. Every conspiracy nut making these off the wall claims about TPM's has never, NEVER actually used them, or probably worked in an actual IT environment.
You've actually wasted a bit of my time actually. Conversation over.
No, no no. You don't honestly expect to make ludicrous ad hominems and walk away unscathed do you? You seem to be rather frustrated. Lets get over the emotional inhibitions you're giving ear to, and instead look at this in an objective light. Since you've worked on this technology since its conception, perhaps you could shed some light for all of us on
why this technology is needed, and
how it can provide security that an effective software solution can't.
There now. I've asked you to do something twice, very nicely both times, now its your turn. This is how people converse, and it is how things get discussed fairly. If you're so intent on breaking the rules, thats fine, but don't expect anyone to take you seriously.
Honestly, does it have to be this difficult? After all this I'm wondering, "even if what he says is correct, and TPM is good, do I really want a technology created by someone with such social inhibitions?" If you can't work through a conversation following manners and etiquette and answer someone's question, what reason do I have to think you can follow the rules of eloquent coding and make a beautiful program? Or follow the universal rules of humanity and not make a tool of destruction?
I'm sincerely interested in what this technology can provide that will benefit humanity. No doubt security is good. But I can secure my own data in layers of software encryption on disc in such a way that even the existence of the encrypted data cannot be known. Why would I need anything more?
Why should I trust my employer with anything more? I shouldn't, don't, can't, and won't.