In fact, if you search "treacherous computing" you'll get lots of good resources. Here's one from CNet: > http://news.cnet.com/2009-1001-964628.html
This is a typical clueful commentary: > http://news.ycombinator.com/item?id=997580
But remember: 1) These are not computers 2) These are not your own. You do not get root. somebody else does. 3) You need to demand and insist on hardware that lets you have root by installing your own keys.
Anybody who doesn't give you 3) is not selling real computers and is simply accommodating outsider policies on a device you do not own, in the privacy of your own home.
Power management, mobile and firmware developer on Linux. Security developer at Aurora. Ex-biologist. mjg59 on Twitter. Content here should not be interpreted as the opinion of my employer. Also on Mastodon.
Treacherous Computing
Date: 2011-09-23 04:24 pm (UTC)> https://www.gnu.org/philosophy/can-you-trust.html
In fact, if you search "treacherous computing" you'll get lots of good resources. Here's one from CNet:
> http://news.cnet.com/2009-1001-964628.html
This is a typical clueful commentary:
> http://news.ycombinator.com/item?id=997580
But remember:
1) These are not computers
2) These are not your own. You do not get root. somebody else does.
3) You need to demand and insist on hardware that lets you have root by installing your own keys.
Anybody who doesn't give you 3) is not selling real computers and is simply accommodating outsider policies on a device you do not own, in the privacy of your own home.