fresh bytes
Subscribe Now

Anti-malware hardware has the potential to make it illegal and impossible to choose to run Linux

It’s been years since the idea of “trusted computing” was first mooted — a hardware layer for PCs that can verify that your OS matches the version the vendor created. At the time, TC advocates proposed that this would be most useful for thwarting malicious software, like rootkits, that compromise user privacy and security.

But from the start, civil liberties people have worried that there was a danger that TC could be used to lock hardware to specific vendors’ operating systems, and prevent you from, for example, tossing out Windows and installing GNU/Linux on your PC.

Continue reading at Boing Boing

Leave a Reply

featured blogs
May 6, 2026
Hollywood has struck gold with The Lord of the Rings and Dune'”so which sci-fi and fantasy books should filmmakers tackle next?...

featured paper

Want early design analysis without simulation?

Sponsored by Siemens Digital Industries Software

Traditional verification methods are failing today's complex IC designs, which require a proactive, early-stage analysis approach. A shift-left methodology addresses IP block integration challenges and the limitations of traditional simulation and ERC tools. Insight Analyzer detects hard-to-find leakage issues across power domains, enabling early analysis without full simulation. Identify inefficiencies earlier to reduce rework, improve reliability, and enhance power performance.

Click to read more!

featured chalk talk

CBOT MULTIGIG Transceiver Platform
In this episode of Chalk Talk, Anders Thelin from TE Connectivity and Amelia Dalton explore how the CBOT MULTIGIG transceiver platform helps address these challenges with a modular, high-performance approach to rugged, high-density connectivity. We also investigate how this platform supports next-generation system architectures, improves design efficiency, and enables robust performance in even the most demanding environments.
May 18, 2026
5,086 views