THE following exhibit, Exhibit px06105 (1997) [PDF]
, is a real 'smoking gun'. People often complain about how TPM [1, 2], DRM and the likes of these technologies stifle interoperability and leave some platforms out in the cold.
From: Bill Gates Sent: Wednesday, July 23, 1997 2:53 PM To: Nathan Myhrvold Cc: Paul Maritz Subject: Security as a lock in
I believe as we evolve our security capabilities there must be some way to set this up so that our operating systems have shared secrets with each other that make them work better with each other than with other operating systems - whether it's JAVAOS layered on top of us or clones or anything else.
I think we need to make this an explicit goal of our security strategy.
---------------------------------------------------------------- From: Paul Maritz Sent: Tuesday, July 29, 1997 5:29 PM To: Jim Allchin (Exchange) Subject: FW: Security as lock in
Fyi
-----Original Message----- From: Yasov Yacobi Sent: Wednesday, July 23, 1997 5:29 PM to: Nathan Myhrvold; Bill Gates Cc: Paul Maritz; Butler Lampson; Dan Ling; Rick Rashid: Gregory Faust Subject: RE: Security as a lock in
Shipping every NT with a unique identifying smart card will do. Else, we can challenge whoever claims to be NT to tell the content of some random line of the NT code -- that'll force him to have a complete NT. Real life is messier (different versions, etc.). Will look into it.
Yacov
-----Original Message----- From: Nathan MYhrvold Sent: Wednesday, July 23, 1997 3:52 PM To: Bill Gates C: Paul Maritz; Butler Lampson; Yacov Yacobi; Dan Ling; Rick Rashid; Gregory Faust Subject: RE: Security as a lock in
I agree that this seems very possible. There are customer benefits to having system components that can interact after establishing trust via authentication. We will look into it.
Nathan
-----Original Message-----
From: Bill Gates Sent: Wednesday, July 23, 1997 2:53 PM To: Nathan Myhrvold Cc: Paul Maritz Subject: Security as a lock in
I believe as we evolve our security capabilities there must be some way to set this up so that our operating systems have shared secrets with each other that make them work better with each other than with other operating systems - whether it's JAVAOS layered on top of us or clones or anything else.
I think we need to make this an explicit goal of our security strategy.
CONFIDENTIAL COUNSEL ONLY
Plaintiff’s Exhibit 6105 Comes V. Microsoft
MS 002770