Trusted Computing

EFF says vendors propose to solve some of today's security problems through hardware changes to the personal computer. Changing hardware design isn't inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users' computers against the users' wishes - they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software.

http://www.trustedcomputing.org/home implements trust into client, server, networking, and communication platforms... formed by Com Paq, HP, IBM, Intel and Microsoft.

http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html


Edited:    |       |    Search Twitter for discussion