Hacking the Xbox: An Introduction to Reverse Engineering
Hacking the Xbox: An Introduction to Reverse Engineering
Cryptography and competition policy: issues with 'trusted computing'
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Privacy, economics, and price discrimination on the Internet
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
iControl: comparing control architectures in computing technology
Proceedings of the 2011 iConference
Hi-index | 0.00 |
Trusted computing (TC) technologies deployed in the PC platform could shift the balance of power in some on-line interactions away from computer end-users and consumers of information goods and services. This effect occurs when remote attestation features make previously indistinguishable software configurations distinguishable; service and information goods providers can then discriminate against disfavored client software. Network externalities mean that even those who don't opt-in to TC use may still be harmed by widespread TC deployment. These effects might be ''defanged'' by some technical changes to TC designs.