Source files of fsfe.org, pdfreaders.org, freeyourandroid.org, ilovefs.org, drm.info, and test.fsfe.org. Contribute: https://fsfe.org/contribute/web/ https://fsfe.org

news-20121120-01.en.xhtml 2.9KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364
  1. <?xml version="1.0" encoding="UTF-8" ?>
  2. <html newsdate="2012-11-20">
  3. <head>
  4. <title>FSFE welcomes German Government's White Paper on "Secure Boot"</title>
  5. </head>
  6. <body>
  7. <h1>FSFE welcomes German Government's White Paper on "Secure Boot"</h1>
  8. <p newsteaser="yes" id="introduction">Yesterday the German Ministry of the
  9. Interior published a white paper about "Trusted Computing" and "Secure Boot".
  10. The white paper says that "device owners must be in complete control of (able
  11. to manage and monitor) all the trusted computing security systems of their
  12. devices." This has been one of FSFE's key demands from the beginning. The document
  13. continues that "delegating this control to third parties requires conscious and
  14. informed consent by the device owner".</p>
  15. <p>Another demand by the FSFE is adressed by the government's white paper. That
  16. before purchasing a device, buyers must be informed concisely about the
  17. technical measures implemented in this device, as well as the specific usage
  18. restrictions and their consequences for the owner: "Trusted computing security
  19. systems must be deactivated (opt-in principle)" when devices are delivered.
  20. "Based on the necessary transparency with regard to technical features and
  21. content of trusted computing solutions, device owners must be able to make
  22. responsible decisions when it comes to product selection, start-up,
  23. configuration, operation and shut-down." And "Deactivation must also be
  24. possible later (opt- out function) and must not have any negative impact on the
  25. functioning of hard- and software that does not use trusted computing
  26. functions."</p>
  27. <blockquote><p>"It is an important step, that a government now takes a firm
  28. stand on "Secure Boot", too. We as a society have to make sure, that we are
  29. in control of our computers, so everyone can install arbitrary software and
  30. is able to retain exclusive control over his own data. Full, sole and
  31. permanent control over security subsystems is necessary for this.", says
  32. Matthias Kirschner, German Coordinator of the FSFE. "Now the Government has
  33. to implement their position when buying new hardware."</p></blockquote>
  34. <ul>
  35. <li><a
  36. href="http://www.bmi.bund.de/SharedDocs/Downloads/DE/Themen/OED_Verwaltung/Informationsgesellschaft/trusted_computing_eng.html">German's
  37. Federal Government White Paper on Trusted Computing and Secure Boot</a></li>
  38. <!-- http://www.bmi.bund.de/SharedDocs/Downloads/DE/Themen/OED_Verwaltung/Informationsgesellschaft/trusted_computing.html -->
  39. <li>
  40. <a href="/campaigns/generalpurposecomputing/secure-boot-analysis.html">
  41. FSFE's analysis: "Secure Boot": Who will control your next computer?</a></li>
  42. <li>FSF's <a
  43. href="http://www.fsf.org/campaigns/secure-boot-vs-restricted-boot/statement">Petition
  44. "Stand up for your freedom to install free software"</a>.</li>
  45. </ul>
  46. </body>
  47. <tags>
  48. <tag>front-page</tag>
  49. <tag>de</tag>
  50. <tag>SecureBoot</tag>
  51. <tag>GeneralPurposeComputing</tag>
  52. </tags>
  53. </html>