Create an Account
username: password:
 
  MemeStreams Logo

The place with the things, and the stuff...

search

k
Picture of k
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

k's topics
Arts
  Literature
   Fiction
   Non-Fiction
   Sci-Fi/Fantasy Literature
  Movies
  Music
   Pop
   Electronic Music
   Rap & Hip Hop
   Indie Rock
   Jazz
   Punk
   Vocalist
  Photography
  TV
Business
  Tech Industry
  Management
  Markets & Investing
Games
  Video Games
   PC Video Games
Health and Wellness
  Fitness
  Medicine
  Nutrition
  Weight Loss
Home and Garden
  Cooking
  Holidays
  Parenting
Miscellaneous
  Humor
Current Events
  War on Terrorism
  Elections
Recreation
  Cars and Trucks
  Martial Arts
  Camping and Hiking
  Travel
Local Information
  United States
   Atlanta
Science
  Astronomy
  Biology
  Chemistry
  Environment
  Geology
  History
  Math
  Medicine
  Nano Tech
  Physics
Society
  Activism
  Crime
  Economics
  Futurism
  International Relations
  (Politics and Law)
   Civil Liberties
    Internet Civil Liberties
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
  Relationships
  Religion
Sports
  Football
  Skiing & Snowboarding
Technology
  Biotechnology
  Computers
   Computer Security
   Cyber-Culture
   PC Hardware
   Human Computer Interaction
   Knowledge Management
   Computer Networking
   Computing Platforms
    Macintosh
    Linux
    Microsoft Windows
   Software Development
    Open Source Development
    Perl Programming
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
From User: bucy

Current Topic: Politics and Law

EFF: Trusted Computing: Promise and Risk
Topic: Politics and Law 1:04 pm EDT, Oct  7, 2003

] Remote attestation works by generating, in hardware, a
] cryptographic certificate attesting to the identity of
] the software currently running on a PC. (There is no
] determination of whether the software is good or bad,
] or whether it is compromised or not compromised.
] "Identity" is represented by a cryptographic hash,
] which simply allows different programs to be
] distinguished from one another, or changes in their
] code to be discerned, without conveying any sort of value
] judgment.) This certificate may, at the PC user's
] request, be provided to any remote party, and in
] principle has the effect of proving to that party that
] the machine is using expected and unaltered software. If
] the software on the machine has been altered, the
] certificate generated will reflect this. We will see
] that this approach, although elegant, proves
] problematic.

READ THIS!

EFF: Trusted Computing: Promise and Risk


Ruling Allows Forcible Drugging of an Inmate Before Execution
Topic: Politics and Law 1:03 pm EDT, Oct  7, 2003

]
] ASHINGTON, Oct. 6 — The Supreme Court on Monday let stand
] a ruling by a federal appeals court allowing Arkansas
] officials to force a convicted murderer to take drugs
] that would make him sane enough to be executed.

Bunch of other SC bits here.

Ruling Allows Forcible Drugging of an Inmate Before Execution


(Last) Newer << 1 - 2 >>
 
 
Powered By Industrial Memetics
RSS2.0