CNET tech sites: Price comparisons | Product reviews | Tech news | Downloads | Site map
Front PageEnterpriseE-BusinessCommunicationsMediaPersonal TechnologyInvestor
Trusted computing comes with a warning

By Robert Lemos
Staff Writer, CNET News.com
April 16, 2003, 4:33 PM PT

SAN FRANCISCO--Cryptographers and security firms are taking opposite sides on the potential privacy dangers of so-called trusted computing, an initiative to use encryption to keep information secure from hackers and, in some cases, the PC's user.

On Wednesday, three companies that sell products and services aimed at securing corporate computers and data told attendees at the RSA Conference 2003 here that trusted computers would help businesses secure their systems. However, the praise came two days after well-known cryptographers warned an audience that trusted computing could put the keys to their information in someone else's hands.

"This key-based infrastructure leads to market dominance and lock-out and allows others to treat your computer as theirs," said Whitfield Diffie, a top encryption expert and chief security officer for Sun Microsystems. The lesson: "Hold the keys to your own computer."

Trusted computers are PCs, servers and consumer devices that can secure specific data using encryption. The Trusted Computing Group was formed last week by Advanced Micro Devices, Hewlett-Packard, IBM, Intel and Microsoft to create specifications for such systems and promote the adoption of trusted platforms. The group has pushed such systems as measures that should make it harder for viruses and hackers to take control of systems and cause damage to critical files.

Even secure companies expose themselves to attack when a customer or supplier connects to their network, said John Muir, a partner with IT security consultancy Trusted Strategies and the moderator of a panel on trusted computing at the conference.

"Even if we have done everything we should be doing, we can still be damaged by connecting to PCs that don't have protections," he said. Trusted computers can help ameliorate the problem by walling off critical data from attacks, he added.

However, critics warn that the technology can also allow software makers and service providers to take control of how their applications run on a person's computer. Such technology could make the legal copying of music and files illegal, make it more difficult for one application to read another's data, and enforce licensing agreements that might not hold up in court.

Ronald Rivest, a computer science professor at the Massachusetts Institute of Technology, warned that, with industry directing the development of the technology, citizens should watch closely where the companies take trusted computing. Rivest is one of the three creators of the RSA encryption technology; he's the R in RSA.

"We should be paying close attention to (trusted computing) and make sure it is along the lines of what we want," he said. "Privacy tends to go down in inverse to the number of transistors in the world."

Others have made similar statements, particularly in regards to a feature of Microsoft's version of trusted computing, formerly known as Palladium but now dubbed the "next-generation secure computing base." The feature, remote attestation, allows an application running on a computer to phone home and check that it's current status, or integrity, can be verified.

However, such concerns are still premature, said Kurt Lennartsson, senior vice president of PointSec and a panelist. As of yet, very little information has been released on how such a scheme will work.

"I think the privacy concerns will be addressed," he said. "The market does a great job in doing that."



Print story E-mail story News.com feeds Send us news tips



 Search News.com
   
 Advanced search

Latest Headlines
display on desktop
Opteron prices reflect AMD confidence
Report: Trouble for integration tools
Intel loses longtime exec Vadasz
SanDisk soars on cell phone potential
FTC targets porn spam operation
Apple reseller puts up the shutters
HandEra waves goodbye to Palm
Chip industry shakes off SARS
'Tekken' developer Namco courts Sega
AOL hands Mac users tighter Net reins
Nokia leans on handsets
Consumer slump hits European PC sales
Security confab focuses on trust, tools
RSA to integrate identification products
SAP weathers gloom, nets profit
Microsoft shrugs off dial-up decline
Mother of invention
Future: Is there life after the browser?
Filling in security GAAPs
Nokia camera sends a cell message
This week's headlines

News Tools
Get news by mobile
XML What is this?
Content licensing
Display news on desktop

CNET newsletters

Enterprise Hardware
Senior editor Michael Kanellos covers chips, servers, and all the hardware that runs your business. (weekly)

Daily Dispatch
Our award-winning editors deliver top stories right to your inbox. (daily)





All News.com newsletters

Send us news tips | Contact Us | Corrections | Privacy Policy

   Featured services: Job Search | IT Community | Compare Prices | IT/IS Policies | MS Access   
  CNET Networks: Builder.com | CNET | GameSpot | mySimon | TechRepublic | ZDNet About CNET   

Copyright ©1995-2003 CNET Networks, Inc. All rights reserved. CNET Jobs