Don't know nature of previous case
Don't know what they were prosecuting, but kiddie porn cases are often the thin end of the wedge to get the public to accept tools that will later be aimed at political dissidents, people who won't unlock their laptop for TSA, etc. Remember that the US government accused Occupy of being "terrorist" in internal memos and that the "terrorism" watchlist here has been revealed to contain more than 1.1 million names of mostly nonviolent people. Since I consider the US government my primary adversary from a data security standpoint, that means that any technology manufactured by an ally of theirs is untrusted. Hell, I don't even know for sure that CPU's don't contain anti-encryption backdoors, only that if they do, nobody has ever been sent to prison using data gained by unlocking a disk that way admitted into open court and then covered by a news source I use. They either don't have or can't admit to having that, which in the end are the same thing.
TPM modules might follow that example, or might follow the ATA security set example and I have no clue which, so no point developing my own software around using a TPM unless I can make my own TPM, which I cannot unless and until 3-d printers can work small enough to fab a chip.
Originally posted by brosis
View Post
TPM modules might follow that example, or might follow the ATA security set example and I have no clue which, so no point developing my own software around using a TPM unless I can make my own TPM, which I cannot unless and until 3-d printers can work small enough to fab a chip.
Comment