2. The restrictions on encryption were
removed some years ago. The best encryption software comes from outside the Unless a vulnerability is found in 256 bit
AES it would take them longer than the ages of the universe to crack a key by
brute force no matter how many terraflops of power they have to task on your
key (not to mention the many others they might want to crack) 3. Filtering content is not quite the same
as signing code and pretending it comes from Microsoft. Such a piece of code would
have a changed checksum would likely be spotted and then analysed. I can’t
see Microsoft doing that unless required by law. 4. TPM is part of the trusted computing
concept. It just makes it much harder. Not impossible. From:
owner-or-talk@xxxxxxxxxxxxx [mailto:owner-or-talk@xxxxxxxxxxxxx] On Behalf Of Ringo Kamens There are a few key points that you are overlooking. 1. In support of the photocopying money scandal, most printers have
yellow dots imprinted on them that track date printed, serial number, etc. 2. By 3. How can you honestly think Microsoft wouldn't bend over for the 4. In terms of using checksums to ensure your system hasn't been
tampered with, the computer hardware could have a defense system against that
such as trusted computing. Ringo Kamens On 5/14/06, Mike
Zanker <mike@xxxxxxxxxx>
wrote: On 14/5/06 15:10, Tony wrote: |