Peter Gutmann (computer scientist)

Source: Wikipedia, the free encyclopedia.
Gutmann speaking at Kawaiicon in Wellington, New Zealand in 2019

Peter Claus Gutmann is a

hard drive more or less securely. Having lived in New Zealand for some time, he has written on such subjects as weta (a group of insects endemic to New Zealand), and the Auckland power crisis of 1998
, during which the electrical power system failed completely in the central city for five weeks, which he has blogged about. He has also written on his career as an "arms courier" for New Zealand, detailing the difficulties faced in complying with customs control regulations with respect to cryptographic products, which were once classed as "munitions" by various jurisdictions including the United States.

Criticism of Windows Vista

His

Security Now! podcast on 2007-01-11.[5]

Response to Criticism

In an article[6] written on September 1, 2007, George Ou offers a rebuttal to Gutmann's statements on Windows Vista. Peter Gutmann is quoted in reference to Windows Vista as saying, "Can others confirm this? I don't run Vista yet, but if this is true then it would seem to disconfirm Microsoft's Claims that the content protection doesn't interfere with playback and is only active when premium content is present.". This garnered criticism from audiences who didn't trust the primary use of secondhand information for detailed data, which was often found on forums. When the quality of Gutmann's research came into question, George Ou himself tested certain assertions from the white paper. He found significant differences between what was reported to be true and what was revealed to occur when performed firsthand, and failed to reproduce multiple alleged results in his own tests.

See also

Bibliography

  • Gutmann, Peter (2014). Engineering Security (Book Draft April 2014) (PDF). Peter Gutmann, Book Draft published online.
  • Gutmann, Peter (2003). Cryptographic Security Architecture: Design and Verification.
    S2CID 27659379
    .
  • Gutmann, Peter (2000). The Design and Verification of a Cryptographic Security Architecture (PhD). .

References

Further reading

External links