Windows 推奨プログラム（WGA）はあなたのコンピュータを遠隔からチェックするマイクロソフトのシステムです。WGAがあなたのハードドライブの様々なパーツをスキャンすることで、あなたが「認証」されたバージョンのウィンドウズを使っている事をマイクロソフトが確認します。 WGAは必須の監視システムで、もしマイクロソフトがあなたは「認証」されていない と判断した場合、あなたのコンピュータの機能が作動しないようにすることができます。現在、マイクロソフトはWGAがチェックをすることを認めています。:
WGA has caused a number privacy related problems, including deletion of software. WGA gets automatically updated as part of Microsoft's critical update procedures, giving users little choice but to accept changes to the systems Microsoft can monitor. Many have claimed that WGA is spyware, and although Microsoft have denied such intent, they retain the power to decide what counts as an invasion of your privacy.
For Windows 7 they are changing the name of the product to Windows 7 Activation Technologies (WAT), but the functionality remains the same.
Microsoft's version of a "Trusted Computing" scheme is called "Palladium". Proprietary programs have included malicious features before, but Palladium would make it universal.
Hollywood and the record companies will use Palladium to ensure that downloaded videos and music can be played only on one specified computer and the sharing of 'authorized' files will be entirely impossible.
Making sharing impossible is bad enough, but it gets worse. There are plans to use the same facility for email and documents--resulting in email that disappears in two weeks, or documents that can only be read on the computers in one company.
Imagine if you get an email from your boss telling you to do something that you think is risky; a month later, when it backfires, you can't use the email to show that the decision was not yours. "Getting it in writing" doesn't protect you when the order is written in disappearing ink.
Treacherous computing puts the existence of free operating systems and free applications at risk, because you may not be able to run them at all.
Some versions of treacherous computing would require the operating system to be specifically authorized by a particular company. Free operating systems could not be installed. Some versions of treacherous computing would require every program to be specifically authorized by the operating system developer.
You could not run free applications on such a system. If you did figure out how, and told someone, that could be a crime.
© 2009 Free Software Foundation, Inc
This page is licensed under the Creative Commons Attribution-No Derivative Works 3.0 License.
To view a copy of this license, visit http://creativecommons.org/licenses/by-nd/3.0/us/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.