Z:gnu-www-ja-right-to-read--0e1ae7-The proponents of this scheme/en

The proponents of this scheme have given it names such as &ldquo;trusted computing&rdquo; and &ldquo;Palladium&rdquo;. We call it &ldquo;treacherous computing&rdquo; because the effect is to make your computer obey companies even to the extent of disobeying and defying you. This was implemented in 2007 as part of Windows Vista; we expect Apple to do something similar. In this scheme, it is the manufacturer that keeps the secret code, but the FBI would have little trouble getting it.