<div dir="ltr">If we worry about 200 Million Windows 8.1 PCs (by 2015) how about 1 Billion mobile devices running Android by 2015?</div><div class="gmail_extra"><br clear="all"><div><div dir="ltr"><div>Blessings</div><div>
<br></div><div>Murigi / Stanley Muraya</div><div><br></div><div><span style="line-height:13px;color:rgb(0,19,32);font-family:Trebuchet,Arial,Helvetica,sans-serif;text-align:justify;background-color:rgb(253,254,255)"><span style="background-color:rgb(253,254,255)"><span style="line-height:20px"><font size="1"><b>"Better a patient person than a warrior, one with self-control than one who takes a city." Prov 16:32</b></font></span><span style="font-size:14px;background-color:rgb(253,254,255)"><br>
</span></span></span></div></div></div>
<br><br><div class="gmail_quote">On Mon, Aug 26, 2013 at 3:12 PM, Evans Ikua <span dir="ltr"><<a href="mailto:ikua.evans@gmail.com" target="_blank">ikua.evans@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div dir="ltr"><p>The German Government is now deeply suspicious that the Trusted
Platform Module (TPM) technology built into a growing number of Windows 8
PCs and tablets is creating a gigantic back door for NSA surveillance,
leaked documents have suggested.</p>
<p>Documents from the German Ministry of Economic Affairs <a href="http://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa/seite-1" rel="nofollow" target="_blank">obtained by German title <i>Zeit Online</i></a>
uncover the alleged unease of officials at the direction of version 2.0
of the standard being developed under the auspices of the multi-vendor
Trusted Computing Group (TCG).</p>
<p>TPM has been marketed as a security and Digital Rights Management
(DRM) technology since its appearance in 2006, but version 2.0 would
embed a chip on every PC that has complete control over which programs
can and can�t run, a setting that can�t be over-ridden under Windows 8.
The chip is also where the cryptographic data is stored for Windows
BitLocker and it enables remote administration.</p><br><div><a href="http://news.techworld.com/security/3465259/is-windows-8-trojan-horse-for-nsa-german-government-thinks-so/#tk.nl_win" target="_blank">Please read more here</a><span class="HOEnZb"><font color="#888888"><br clear="all">
<br>-- <br><b>----------------------------------------------------<br>Kind Regards,<br>Evans Ikua,</b><br>
</font></span></div></div>
<br>_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/murigi.muraya%40gmail.com" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/murigi.muraya%40gmail.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
</blockquote></div><br></div>