Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo


Unsupported browser: Your browser does not meet modern web standards. See how it scores »

{ action.text }

Microsoft and the Alliance deny that their systems would restrict the kind of software or documents computer owners could use on their machines, and they emphasize that their only goal is to protect users’ data. They also dismiss claims by critics who say the systems could be used for invasive procedures such as remote deletion of files. “The notes that I’ve seen posted on the Web, I think, were pretty far-fetched and many of them impossible,” says Clain Anderson, director of security solutions for IBM’s PC division.

England at Microsoft, Meinschein at Intel, and Anderson at IBM all acknowledge, however, that the security chips will make digital rights management far more effective by allowing software makers and providers of online content including music, movies, and books to put more elaborate restrictions on the way computer owners use data. An operating system with a special security chip “could implement policy on top of it that users may like or that users may not like,” says Meinschein.

The decision to buy a PC with such a security chip and even whether to enable the chip, however, will still belong to consumers, Meinschein notes. “We’ve taken, I think, the necessary initial steps to try to ensure that these technologies can be used in reasonable ways and that users have control of their privacy and of the device. But some of this is frankly going to be evolution, and we as users and as a community, we’re going to have to work through this.” Computer owners, in other words, will have to decide whether they really trust the good guys more than they fear the bad guys.

0 comments about this story. Start the discussion »

Tagged: Computing

Reprints and Permissions | Send feedback to the editor

From the Archives


Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me