Trusted Computing

Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by computer hardware and software. Enforcing this behavior is achieved by loading the hardware with a unique encryption key inaccessible to the rest of the system.

TC is controversial as the hardware is not only secured for its owner, but also secured against its owner. Such controversy has led opponents of trusted computing, such as free software activist Richard Stallman, to refer to it instead as treacherous computing, even to the point where some scholarly articles have begun to place scare quotes around "trusted computing".

Trusted Computing proponents such as International Data Corporation, the Enterprise Strategy Group and Endpoint Technologies Associates claim the technology will make computers safer, less prone to viruses and malware, and thus more reliable from an end-user perspective. In addition, they also claim that Trusted Computing will allow computers and servers to offer improved computer security over that which is currently available. Opponents often claim this technology will be used primarily to enforce digital rights management policies and not to increase computer security.

Chip manufacturers Intel and AMD, hardware manufacturers such as Dell, and operating system providers such as Microsoft all plan to include Trusted Computing in coming generations of products.a The U.S. Army requires that every new small PC it purchases must come with a Trusted Platform Module (TPM). As of July 3, 2007, so does virtually the entire United States Department of Defense.

Read more about Trusted Computing:  Key Concepts, Criticism, Hardware and Software Support

Other articles related to "trusted computing, computing, trusted":

Trusted Execution Technology - See Also
... Trusted Computing Trusted Computing Base Trusted Computing Group Trusted Platform Module (TPM) ...
Trusted Computing Group - Criticism
... For more, see Trusted Computing#Criticism ... Significant backlash amongst the Trusted Computing Group was present during Richard Stallman's speech at the Hackers on Planet Earth conference in July 2006, in New York ... The criticism calls Trusted Computing "Treacherous Computing" instead and warns that vendors can lock out software that is not officially signed by specific vendors, rendering it unusable ...
Trusted Computing - Hardware and Software Support
... Since 2004, most major manufacturers have shipped systems that have included Trusted Platform Modules, with associated BIOS support ... In accordance with the TCG specifications, the user must enable the Trusted Platform Module before it can be used ... The Linux kernel has included trusted computing support since version 2.6.13, and there are several projects to implement trusted computing for Linux ...
Trusted Computing Group
... The Trusted Computing Group (TCG), successor to the Trusted Computing Platform Alliance (TCPA), is an initiative started by AMD, Hewlett-Packard, IBM, Intel, and ...

Famous quotes containing the word trusted:

    I am trusted with a muzzle and enfranchised with a clog; therefore I have decreed not to sing in my cage.
    William Shakespeare (1564–1616)