Z:gnu-www-ja-google-engineering-talk--44c060-And there are various differen/en

And there are various different things that treacherous computing can be used to do, things like prohibit you from running any program that hasn't been authorized by the operating system developer. That's one thing they could do. But they may not feel they dare go that far. But another thing that they plan to do is to have data that's only available to a particular application. The idea is that an application will be able to write data in an encrypted form, such that it can only be decrypted by the same application, such that nobody else can independently write another program to access that data. And, of course, they would use that for limiting access to published works, you know, something to be a replacement for DVDs so that it would be not only illegal, but impossible to write the free software to play it.