Competition and ‘Trusted Computing’ Ross Anderson Cambridge University and Foundation for Information Policy Research.

Slides:



Advertisements
Similar presentations
IT: Communication and Impacts
Advertisements

Information Technology
Cambridge Software / Pricing Bundle
Vista, TC and Competition Policy Ross Anderson Cambridge University and Foundation for Information Policy Research.
Who benefits from stronger Digital Rights Management? Ross Anderson Cambridge University and Foundation for Information Policy Research.
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Lecture 19 Page 1 CS 111 Online Protecting Operating Systems Resources How do we use these various tools to protect actual OS resources? Memory? Files?
Trusted Computing Platforms Blessing or Curse? by Bastian Sopora, Seminar DRM 2006.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
Security Economics Ross Anderson Cambridge University.
Security Economics Ross Anderson Cambridge University.
W15D3. Protection (recap) Common sense Antivirus software (some free, eg: AVG) Update OS Verify the validity of info in s received  Use search.
Economics of Dependability and Security Economics of Dependability and Security Ross Anderson Cambridge University.
The Economics of Information Security Ross Anderson Cambridge University.
Information Society – Future Prospects Ross Anderson Cambridge University and Foundation for Information Policy Research.
An Economic Perspective on Security Ross Anderson Cambridge University.
System Security for Cyborgs Ross Anderson Cambridge.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Security Economics Ross Anderson Cambridge University.
Economics, Policy and Information Security Economics, Policy and Information Security Ross Anderson Cambridge University.
Security Economics and Public Policy Ross Anderson Cambridge University.
BUSINESS PLAN How do you make a business Plan?
Marketing Essentials Section 3.1 Capitalism
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Will you need your umbrella?.  Objective: Explain the Cloud In business terms, so you can see if it will benefit you.  Agenda: 12:00 – Welcome and Introductions.
Melissa Harrigan. Podcasts Podcasts are mini-broadcasts that can be viewed on the internet or downloaded to MP3 players It’s the new way to watch TV or.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
E-Commerce. What is E-Commerce Industry Canada version Commercial activity conducted over networks linking electronic devices (usually computers.) Simple.
Price Discrimination. What is Price Discrimination? Single-price monopolist are ones that charge all consumers the same price Single-price monopolist.
The Economy Chapter 3 and 4.
Not only Safe but Competitive Presentation to Copy Protection Technical Working Group October 22, 2003 Far East Engineering Corp, Tokyo Japan Makoto Saito/Rie.
David Overton Head of Small Business Technology – Head of Small Business Technology – Microsoft solutions for.
Windows XP End of Life Microsoft support for Windows XP SP3 and Office 2003 ends April 8, 2014.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Introducing Digital Rights Management Willms Buhse October 2002, Vilnius.
Group 06-From Lecture 06 Member 02 Presented by: Xu Wei iTunes B2C SUCCESS STORY&CONTROVERSIAL ISSUES.
Three steps to sell Office Always ask every customer the following questions to get them interested in buying Office: Did you know that Office.
Today…  Long Term Pricing Strategies  Short Term Pricing Strategies.
SEC303 Assessing and Managing Privacy in the Enterprise JC Cannon Privacy Strategist.
1 Digital Rights Management Dissenting Argument: Users of Digital Media should obey digital rights management systems to guarantee the integrity and protect.
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
Session 1.  Websites  Mobile Websites  WordPress Security  Reputation Marketing  Coming Soon ◦ Contractor Software ◦ Facebook Pages ◦ Mobile Apps.
Eng.Abed Al Ghani H. Abu Jabal Introduction to computers.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Technological Change Technological change (TC) is a term that is used to describe the overall process of invention, innovation and diffusion of technology.
Computer security By Isabelle Cooper.
Digital Access Digital Commerce Digital Communication Digital Literacy Digital Etiquette Digital Law Digital Rights and Responsibilities Digital Health.
Refurbished Apple Products
By: Lazy Eights. Google Challenges Microsoft Eric Schmidt, Chief Executive of Google, has made blatant challenges towards Microsoft. The most recent challenge.
Impacts of I.T. Ethical, Social, legal and economic impacts on I.T.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
“Trusted” Computing Platform Alliance Eric L. Frederich COT 4810 Nov. 4 th 2004.
Digital Rights Management Maxim Fastovsky. What is DRM? DRM technologies attempt to control use of digital media by preventing access, copying or conversion.
Over the past 40 years, IT has influenced and really changed the way we live out lives. It’s fair to say that we love our gadgets; with most of us owning.
The Case against Microsoft. © 2004 Pearson Addison-Wesley. All rights reserved12-2.
Cloud Computing 10 Cloud Computing 10. Cloud Computing 10 You’ll have heard about the ‘Cloud’ Lots of you will use it! But you need to be clear about.
Types of computers Module 1.10 AS identifies and distinguishes between computer types and associated software. AS identifies the main hardware.
Electronic Safety and Security - New Challenges for the Car Industry
Work on the Fly Hosted Solutions for Timeslips Customers
MGMT 452 Corporate Social Responsibility
Outline What does the OS protect? Authentication for operating systems
Outline What does the OS protect? Authentication for operating systems
Microsoft Office Support Phone Number
BIS 221 RANK Education Your Life--
BIS 221 RANK Education for Service-- bis221rank.com.
Internet Basics.
The Free Enterprise System
Creative Media Pre-production Introduction Creative Media GCSE
Presentation transcript:

Competition and ‘Trusted Computing’ Ross Anderson Cambridge University and Foundation for Information Policy Research

Economics and Security Over the last four years, we’ve started to apply economic analysis to information security Over the last four years, we’ve started to apply economic analysis to information security Economic analysis often explains security failure better! Bank customers suffer when bank systems allow fraud, patients suffer when hospital systems break privacy Economic analysis often explains security failure better! Bank customers suffer when bank systems allow fraud, patients suffer when hospital systems break privacy People who can protect a system are not the people who suffer when it’s hacked People who can protect a system are not the people who suffer when it’s hacked And information security mechanisms are used increasingly to support business models rather than manage risk And information security mechanisms are used increasingly to support business models rather than manage risk

New Uses of Infosec Xerox started using authentication in ink cartridges to tie them to the printer. Followed by HP, Lexmark and others Xerox started using authentication in ink cartridges to tie them to the printer. Followed by HP, Lexmark and others Motorola started authenticating batteries to mobile phones Motorola started authenticating batteries to mobile phones BMW now has a prototype car that authenticates its major components BMW now has a prototype car that authenticates its major components Increasingly crypto is used to lock customers in, tie products, bundle services, enforce cross- subsidies and rig markets generally Increasingly crypto is used to lock customers in, tie products, bundle services, enforce cross- subsidies and rig markets generally Now ‘Trusted Computing’ will deepen this Now ‘Trusted Computing’ will deepen this

What’s Software Worth? The value of a software company is the total switching costs of all its customers The value of a software company is the total switching costs of all its customers E.g., law firm with 100 fee earners paying £500 a seat for Office -> it would cost £50K to retrain everyone to use OpenOffice, convert files etc E.g., law firm with 100 fee earners paying £500 a seat for Office -> it would cost £50K to retrain everyone to use OpenOffice, convert files etc In software, lock-in plays the role that patents do in the drug industry In software, lock-in plays the role that patents do in the drug industry Same holds for many other online services Same holds for many other online services

Rights Management and Competition IRM – Information Rights Management – changes ownership of a file from the machine owner to the file creator IRM – Information Rights Management – changes ownership of a file from the machine owner to the file creator Files are encrypted and associated with rights management information Files are encrypted and associated with rights management information The file creator can specify that a file can only be read by Mr. X, and only till date Y The file creator can specify that a file can only be read by Mr. X, and only till date Y Now shipping in Office 2003 Now shipping in Office 2003 What will be the effect on the typical business that uses PCs? What will be the effect on the typical business that uses PCs?

TC (Trusted / Trustworthy / Treacherous Computing) ‘ Trusted Computing Group’ (TCG) redsigning PCs to give better support to DRM, to the IRM mechanisms in Office 2003, to online software registration etc ‘ Trusted Computing Group’ (TCG) redsigning PCs to give better support to DRM, to the IRM mechanisms in Office 2003, to online software registration etc Idea – put a TPM (smartcard) chip in every PC motherboard, PDA, mobile phone Idea – put a TPM (smartcard) chip in every PC motherboard, PDA, mobile phone This will do remote attestation of what the machine is and what software it’s running This will do remote attestation of what the machine is and what software it’s running On top of this will be layers of software providing new security functionality, of a kind that would otherwise be easily circumvented On top of this will be layers of software providing new security functionality, of a kind that would otherwise be easily circumvented

Why is Microsoft so Keen? At present, a company with 100 PCs pays maybe £500 per seat for Office At present, a company with 100 PCs pays maybe £500 per seat for Office Remember – value of software company = total switching costs Remember – value of software company = total switching costs So – cost of retraining everyone to use Linux, converting files etc is maybe £50,000 So – cost of retraining everyone to use Linux, converting files etc is maybe £50,000 But once many of the documents can’t be converted without the creators’ permission, the switching cost is much higher But once many of the documents can’t be converted without the creators’ permission, the switching cost is much higher Bill: ‘we came to this thinking about music but then realised documents and were much more interesting’ Bill: ‘we came to this thinking about music but then realised documents and were much more interesting’

Strategic Issues Who will control users’ data? Who will control users’ data? Microsoft view – everything will be on an MS platform (your WP files, presentations, address book, pictures, movies, music) Microsoft view – everything will be on an MS platform (your WP files, presentations, address book, pictures, movies, music) European Commission view – this is illegal anticompetitive behaviour European Commission view – this is illegal anticompetitive behaviour Anti-trust judgment – orders MS to unbundle Media Player Anti-trust judgment – orders MS to unbundle Media Player Also, German government view on competition policy requirements on TCG Also, German government view on competition policy requirements on TCG

Competitive Issues For years, Microsoft’s vision has been to control a framework into which all user data is drawn, and in which it is then managed For years, Microsoft’s vision has been to control a framework into which all user data is drawn, and in which it is then managed TC could extend Microsoft’s market power from the PC to PDAs, phones, music systems, … TC could extend Microsoft’s market power from the PC to PDAs, phones, music systems, … If this works it is bad news for free markets, and for vendors of phones / consumer electronics If this works it is bad news for free markets, and for vendors of phones / consumer electronics Even if not, TC could have all sorts of effects on software and online industries Even if not, TC could have all sorts of effects on software and online industries

Competitive Issues (2) At present, there are many petabytes of ‘free’ data for new apps to use (I.e., your data) At present, there are many petabytes of ‘free’ data for new apps to use (I.e., your data) In future, apps can use TC mechanisms to lock in users by locking down their data In future, apps can use TC mechanisms to lock in users by locking down their data Successful app vendors can rent out access to your data on your own PC to other apps Successful app vendors can rent out access to your data on your own PC to other apps Software startups will have lower probability of success, though the winners will win bigger Software startups will have lower probability of success, though the winners will win bigger The software industry will become much less dynamic, more like a ‘normal’ industry - at a cost in growth and jobs (especially in LDCs) The software industry will become much less dynamic, more like a ‘normal’ industry - at a cost in growth and jobs (especially in LDCs)

Competitive Issues (3) Playstation model - subsidize hardware from later software sales Playstation model - subsidize hardware from later software sales a PC costs $399 in Walmart, a TC $ a PC costs $399 in Walmart, a TC $ you buy an Office Plan for $29.95 a month including unlimited Word and Excel with 500 anytime Powerpoint minutes per month. The hardware comes free you buy an Office Plan for $29.95 a month including unlimited Word and Excel with 500 anytime Powerpoint minutes per month. The hardware comes free What will the effect on free software? What will the effect on free software? What’s the effect on the Internal Market? Firms will want and be able to price discriminate What’s the effect on the Internal Market? Firms will want and be able to price discriminate And the pervasive computing future??? And the pervasive computing future???

Conclusion TC has nasty effects on competition policy (see my website for more detail) TC has nasty effects on competition policy (see my website for more detail) It’s a cynical way of twisting the TRIPs anti- circumvention prohibitions into a general- purpose anti-competitive tool It’s a cynical way of twisting the TRIPs anti- circumvention prohibitions into a general- purpose anti-competitive tool But enough firms will get hurt that we can surely build momentum against it But enough firms will get hurt that we can surely build momentum against it A digital rights directive must buttress not just consumer freedoms but also market freedoms A digital rights directive must buttress not just consumer freedoms but also market freedoms It’s not just about music - it’s about everything contain software! That is, just about everything It’s not just about music - it’s about everything contain software! That is, just about everything