The problem I have with that article is the statement that "by default" the
drive would be encrypted [using the tpm key].
That just isn't true--I doubt any OEM except some very small and specialized
ones will ship machines already encrypted. I told you that I have a couple
of laptops that have TPM chips in them--they didn't come with that feature
enabled in the bios, and there are very clear warnings in the bios settings
about enabling several related features--basically, it's a one-way
street--you can turn them on, but not off again, as I recall.
Additionally, I don't think the TPM related features will be in XP Home--and
maybe only in the Enterprise and the version that "has everything"--can't
recall what the real names are at this point.
I don't know how to balance the need to prevent crime and terrorism and still
allow ordinary folks and people with corporate data they need reasonably to
protect to use encryption as a tool for that lawful end.
I'll leave that to the Home office to discuss with Microsoft. I suspect
there's some equivalent conversations going on this side of the Atlantic.
--
plun said:
Hi Bill
Well, TPM again.......
For sure EFS is stupid and also how to change the admin password for a XP
PC.
For every civilised country with law and order it´s remarcable that
MS will use this technique so criminals such as phedofils can lock
a PC.....
Locksmiths can open locks, car sales have main keys for cars and so on.
But a PC should have TPM..... and maybe all users a now
should sleep with bitlocker codes within a flashmemory
around their neck.....
MS spreads paranoia about this....
And Sony will for sure use this chip instead of rootkits
I really hope that these wonderful englishmens with some thinking
MPs can stop this.
http://news.bbc.co.uk/1/hi/uk_politics/4713018.stm
And for XP MS already opens EFS encrypted systems if a court order demands
it.
Nevertheless what the MSDN lobby writes..........
Vista was delayed again...........
regards
plun