Âé¶¹´«Ã½

Technology

Nowhere to hide

By Barry Fox

13 January 2001

Most stolen computers will eventually be used online, says IBM. So in a move
that will leave privacy advocates agog, it suggests each PC should have a unique
code that is encrypted and stored in a key component of the machine (EP
1041483). Whenever the PC goes online, the code is there for any server to read
and compare with databases of stolen computers. And you thought Internet cookies
were intrusive…

Sign up to our weekly newsletter

Receive a weekly dose of discovery in your inbox. We'll also keep you up to date with Âé¶¹´«Ã½ events and special offers.

Sign up

To continue reading, today with our introductory offers

or

Existing subscribers

Sign in to your account
Piano Exit Overlay Banner Mobile Piano Exit Overlay Banner Desktop