Wednesday, December 13, 2006
Let Me See If It's Yours
Wink: I want to die in my sleep like my grandfather, not screaming and yelling like his passengers.
This is the era of trojan virus worm infested rootkit computing. We are advised by experts to have software and hardware firewalls between our computers and the outside internet world to protect our systems from the demons that exist online.
Yet with certain popular operating systems we must allow data to flow from our hard drives to distant companies computers. These codes of varying names are two way in that they look for and remove data from your drive, take it to theirs, and deposit more code on yours so theirs can tell yours is yours.
To me that is opening the security of your computer. Supposedly there is no private information exchanged. But there must be. Otherwise, how can they tell your computer from mine? If they know I changed hard drives, or a motherboard, then that's personal. What other information is or can be exchanged? I am not sharing my hard drive, yet this verification can take place. How secure is that?
In order for your operating system to work, you must trust them and allow this exchange. Does this happen every time you start your computer? Guess! But they don't trust you. You have little choice but to allow this if you want to use 'their' operating system.
Imagine buying your car, but you can't lock it, cause the company may want to take it for a drive to see if its yours.
This work by NSCAVE is licensed under a Creative Commons Attribution-NoDerivs 3.0 Unported License
This is the era of trojan virus worm infested rootkit computing. We are advised by experts to have software and hardware firewalls between our computers and the outside internet world to protect our systems from the demons that exist online.
Yet with certain popular operating systems we must allow data to flow from our hard drives to distant companies computers. These codes of varying names are two way in that they look for and remove data from your drive, take it to theirs, and deposit more code on yours so theirs can tell yours is yours.
To me that is opening the security of your computer. Supposedly there is no private information exchanged. But there must be. Otherwise, how can they tell your computer from mine? If they know I changed hard drives, or a motherboard, then that's personal. What other information is or can be exchanged? I am not sharing my hard drive, yet this verification can take place. How secure is that?
In order for your operating system to work, you must trust them and allow this exchange. Does this happen every time you start your computer? Guess! But they don't trust you. You have little choice but to allow this if you want to use 'their' operating system.
Imagine buying your car, but you can't lock it, cause the company may want to take it for a drive to see if its yours.
This work by NSCAVE is licensed under a Creative Commons Attribution-NoDerivs 3.0 Unported License
Comments:
Post a Comment
What's your take? Agree? Disagree? Comment!