What are TCPA
TCPA stands for the Trusted Computing Platform Alliance,
an initiative led by Intel. Their stated goal is `a new computing platform for
the next century that will provide for improved trust in the PC platform.' Palladium
is software that Microsoft says it plans to incorporate in future versions of
Windows; it will build on the TCPA hardware, and will add some extra features.
What does TCPA / Palladium
It provides a computing platform on which you can't tamper with the
applications, and where these applications can communicate securely with the vendor.
The obvious application is digital rights management (DRM): Disney will be able
to sell you DVDs that will decrypt and run on a Palladium platform, but which
you won't be able to copy. The music industry will be able to sell you music downloads
that you won't be able to swap. They will be able to sell you CDs that you'll
only be able to play three times, or only on your birthday. All sorts of new marketing
possibilities will open up.
/ Palladium will also make it much harder for you to run unlicensed software.
Pirate software can be detected and deleted remotely. It will also make it easier
for people to rent software rather than buying it; and if you stop paying the
rent, then not only does the software stop working but so may the files it created.
For years, Bill Gates has dreamed of finding a way to make the Chinese pay for
software: Palladium could be the answer to his prayer.
There are many other
be able to arrange things so that all Word documents created on civil servants'
PCs are `born classified' and can't be leaked electronically to journalists. Auction
sites might insist that you use trusted proxy software for bidding, so that you
can't bid tactically at the auction. Cheating at computer games could be made
more difficult. There is a downside too.
There will be remote censorship: the
mechanisms designed to delete pirated music under remote control may be used to
delete documents that a court (or a software company) has decided are offensive
- this could be anything from pornography to writings that criticise political
leaders. Software companies can also make it harder for you to switch to their
competitors' products; for example, Word could encrypt all your documents using
keys that only Microsoft products have access to; this would mean that you could
only read them using Microsoft products, not with any competing word processor.
You may also like this : Smart Quill, Spam Assassin, Stereoscopic Imaging, Zigbee, Ultra-Wideband, Home Networking, Internet Protocol Television , Bacterio-Rhodopsin Memory, Blade Servers, Digital Cinema, Holographic Versatile Disc, Itanium Processor , Local Multipoint Distribution Service , Network Attached Storage, Night Vision Technology, Opera (web browser), Parasitic Computing, Performance Testing, Java Ring , RD RAM , GSM Security And Encryption , Fast Convergence Algorithms for Active Noise Controlin Vehicles , 3G vs WiFi , Data Security in Local Network using Distributed Firewalls, Computerized Paper Evaluation using Neural Network, Bluetooth Based Smart Sensor Networks , Laser Communications, Multiple Domain Orientation , Industrial Applications using Neural Networks , Implementation Of Zoom FFT , Image Processing , Virtual keyboard , Transient Stability Assessment using Neural Networks , Tracking and Positioning of Mobiles in Telecommunication, Timing Attacks on Implementations , Prototype System Design for Telemedicine , Optical Networking and Dense Wavelength Division Multiplexing , Optical Burst Switching, Image Processing & Compression , Cyberterrorism , Ipv6 - The Next Generation Protocol , Driving Optical Network Evolution , Cellular Neural Network , Radio Network Controller , Digital Audio Broadcasting , Significance of real-time transport Protocol in VOIP , Space Mouse , Resilient Packet Ring Technology , Wireless Networked Digital Devices, Design of 2-D Filters using a Parallel Processor Architecture, Computer Seminars Reports and PPT