Rant PC Format magazine prefers Windows 8

Discussion in 'General' started by TheGreatSatan, 10 Nov 2013.

  1. theshadow2001

    theshadow2001 [DELETE] means [DELETE]

    Joined:
    3 May 2012
    Posts:
    5,263
    Likes Received:
    176
    Thats the camp I fall into. I use a lot of interfaces. XP, windows 7 and 8, ubuntus unity, gnome3, xfce and command line interfaces

    Using the ms android remote desktop app I can experience metro on a tablet. On a tablet its supererior to androids interface. On the desktop it just doesnt click with me. Especially the needless duality it introduces.

    In fact on the same lines of needless duality. I would say that windows rt doesnt need a traditional desktop interface the metro end should be enough for tablety devices
     
  2. rainbowbridge

    rainbowbridge Minimodder

    Joined:
    26 Apr 2009
    Posts:
    3,171
    Likes Received:
    69
    I can feel it is evil, able to tell some thing is not right on this platform straight away, Ive been on PC's since C64.


    Offically, I highly recommend...

    Unoffically, you have to be reading things like the below and understanding its not Windows 95 and free open internet any more, the world is changing.


    “A Special Surveillance Chip”


    According to leaked internal documents from the German Federal Office for Information Security (BSI) that Die Zeit obtained, IT experts figured out that Windows 8, the touch-screen enabled, super-duper, but sales-challenged Microsoft operating system is outright dangerous for data security. It allows Microsoft to control the computer remotely through a built-in backdoor. Keys to that backdoor are likely accessible to the NSA – and in an unintended ironic twist, perhaps even to the Chinese.

    The backdoor is called “Trusted Computing,” developed and promoted by the Trusted Computing Group, founded a decade ago by the all-American tech companies AMD, Cisco, Hewlett-Packard, IBM, Intel, Microsoft, and Wave Systems. Its core element is a chip, the Trusted Platform Module (TPM), and an operating system designed for it, such as Windows 8. Trusted Computing Group has developed the specifications of how the chip and operating systems work together.

    Its purpose is Digital Rights Management and computer security. The system decides what software had been legally obtained and would be allowed to run on the computer, and what software, such as illegal copies or viruses and Trojans, should be disabled. The whole process would be governed by Windows, and through remote access, by Microsoft.

    Now there is a new set of specifications out, creatively dubbed TPM 2.0. While TPM allowed users to opt in and out, TPM 2.0 is activated by default when the computer boots up. The user cannot turn it off. Microsoft decides what software can run on the computer, and the user cannot influence it in any way. Windows governs TPM 2.0. And what Microsoft does remotely is not visible to the user. In short, users of Windows 8 with TPM 2.0 surrender control over their machines the moment they turn it on for the first time.

    It would be easy for Microsoft or chip manufacturers to pass the backdoor keys to the NSA and allow it to control those computers. NO, Microsoft would never do that, we protest. Alas, Microsoft, as we have learned from the constant flow of revelations, informs the US government of security holes in its products well before it issues fixes so that government agencies take advantage of the holes and get what they’re looking for.

    Experts at the BSI, the Ministry of Economic Affairs, and the Federal Administration warned unequivocally against using computers with Windows 8 and TPM 2.0. One of the documents from early 2012 lamented, “Due to the loss of full sovereignty over the information technology, the security objectives of ‘confidentiality’ and ‘integrity’ can no longer be guaranteed.”

    Elsewhere, the document warns, “This can have significant consequences on the IT security of the Federal Administration.” And it concludes, “The use of ‘Trusted Computing’ technology in this form … is unacceptable for the Federal Administration and for operators of critical infrastructure.”

    Another document claims that Windows 8 with TPM 2.0 is “already” no longer usable. But Windows 7 can “be operated safely until 2020.” After that other solutions would have to be found for the IT systems of the Administration.

    The documents also show that the German government tried to influence the formation of the TPM 2.0 specifications – a common practice in processes that take years and have many stakeholders – but was rebuffed. Others have gotten what they wanted, Die Zeit wrote. The NSA for example. At one of the last meetings between the TCG and various stakeholders, someone dropped the line, “The NSA agrees.”

    Rüdiger Weis, a professor at the Beuth University of Technology in Berlin, and a cryptographic expert who has dealt with Trusted Computing for years, told Die Zeit in an interview that Microsoft wanted to completely change computing by integrating “a special surveillance chip” in every electronic device. Through that chip and the processes of Windows 8, particularly Secure Boot, “users largely lose control over their own hardware and software.”

    But wouldn’t it contribute to higher levels of security? Certain aspects actually raise the risks, he said. For example, during production, the secret key to that backdoor is generated outside the chip and then transferred to the chip. During this process, copies of all keys can be made. “It’s possible that there are even legal requirements to that effect that cannot be reported.” And so the TPM is “a dream chip of the NSA.”

    Perhaps even more ominously, he added: “The other realistic scenario is that TPM chip manufactures don’t sit within reach of the NSA, but in China….”

    Apple phased out the surveillance chips in 2009. Linux doesn’t comply with the standards, and Linux machines cannot use the technology. Microsoft defended itself the best it could. The TPM is activated by default because most users accept defaults, it said. If users would have to activate the functions themselves, many users would end up operating a less secure system. And of course, government regulations that would require that users have the option to opt in or out would be unwise.

    Instead, hardware manufactures could build machines with the chips deactivated, Microsoft said. If you want to have control over your computer, that’s what you’d have to buy. Another option would be to switch to Linux machines, something that the city government of Munich has started 10 years ago; the changeover should be complete before the year is up. This end of the NSA debacle cannot possibly be twisted into bullish news for Microsoft.

    China is the promised land for our revenue-challenged tech heroes: over a billion consumers, economic growth several times that of the US, and companies splurging on IT. Layer the “cloud” on top, and China is corporate nirvana: a high-growth sector in a high-growth country. Or was nirvana, now that the NSA’s hyperactive spying practices have spilled out. Read…. US Tech Companies Raked Over The Coals In China.


    Read more at http://investmentwatchblog.com/leak...-windows-8-links-the-nsa/#eID8tKbPItgeiMKg.99
     
  3. Weekly_Estimate

    Weekly_Estimate Gives credit where its due

    Joined:
    1 Feb 2010
    Posts:
    3,346
    Likes Received:
    384
    Holy Crap!
     
  4. Atomic

    Atomic Gerwaff

    Joined:
    6 May 2002
    Posts:
    9,646
    Likes Received:
    94
  5. adrock

    adrock Caninus Nervous Rex

    Joined:
    5 Dec 2006
    Posts:
    1,265
    Likes Received:
    43
    if it's been in versions prior to windows 8, and it's meant to disable software that isn't legitimately licensed, it's not working. I can't elaborate on how i know this.

    Is trust computing the guys who phone me up every so often and tell me there's a potentially lethal computer virus affecting computers in gateshead. oh you're not in gateshead, that must be our mistake sorry, but the same virus is affecting Edinburgh computers also. They're calling me from windows support on my PC to help me get protected against this potentially lethal virus.

    gateshead is what my location shows as thanks to my ISP (i hear all the single ladies are on the internet in gateshead).

    So far my responses have been:
    'explain the concept of a lethal computer virus to me. Who dies?'
    'I'm sorry, i only run linux'
    'I'm sorry, i don't have a computer'
    'What a coincidence I was just meaning to call you about these magic beans'
    'yes, it's quite good isn't it'

    the last couple i've asked them to hold a moment then put the phone next to my speakers while i played battlefield. they'd hung up by the end of the round.

    They seem to call me every six months or so, not frequently enough for me to be overly annoyed, but the fact is the guy's name is not Geoffrey, he is sure as hell not calling from 'Windows on your computer', and there isn't a lethal virus affecting Gateshead and Edinburgh.

    This started in 2006, damn me for keeping my home phone number!



    edit: started this post intending to write that i'm not using 8 or 8.1 because i don't see the point in paying the expense when it doesn't appear to offer me anything i want.

    windows starts up, i login. everything after that is done through keyboard shortcuts or launchy. so long as metro lets me arrange my windows over two displays in the layout I've found to work best, and i can still control everything the same way (because that is the most efficient way i have found and i doubt MS have done a case study on my usage to refine it) then I wouldn't have any problems, but i'd not be getting anything for me £80+ quid spend.
     
  6. IvanIvanovich

    IvanIvanovich будет глотать вашу душу.

    Joined:
    31 Aug 2008
    Posts:
    4,870
    Likes Received:
    252
    TPM has been around for awhile but even if you are looking for that feature it's not easy to find on most consumer level motherboards. If you have TPM it will show up in device manager under 'Security Devices'. You usually have to go for more professional workstation or server type end of things to find them with TPM. TPM isn't really meant for the home user, but for corporate/institutional who need to worry about things like license compliance so they aren't ending up getting fined. It's also 'required' for bitlocker and some other commercial encryption systems to function properly.
    Really though pretty much no one uses TPM or cares about it at all on consumer PC. Even the few that do have it usually have it disabled in the bios and user has to enable it (or might even need to flash a special TPM bios file to make it available) on purpose.
     

Share This Page