Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Trusted Computing
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Technology developed and promoted by the Trusted Computing Group}} {{Distinguish|Trusted computing base|Trustworthy computing}} '''Trusted Computing''' ('''TC''') is a technology developed and promoted by the [[Trusted Computing Group]].<ref name="mitchell">{{cite book|author=Chris Mitchell|title=Trusted Computing|url=https://books.google.com/books?id=9iriBw2AuToC|year=2005|publisher=IET|isbn=978-0-86341-525-8}}</ref> The term is taken from the field of [[trusted system]]s and has a specialized meaning that is distinct from the field of [[confidential computing]].<ref name="ccc">{{cite web |title=What is the Confidential Computing Consortium? |url=https://confidentialcomputing.io/ |website=Confidential Computing Consortium |access-date=20 May 2022}}</ref> With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by [[computer hardware]] and [[software]].<ref name="mitchell" /> Enforcing this behavior is achieved by loading the hardware with a unique [[encryption key]] that is inaccessible to the rest of the system and the owner. TC is controversial as the hardware is not only secured for its owner, but also against its owner, leading opponents of the technology like [[free software]] activist [[Richard Stallman]] to deride it as "treacherous computing",<ref name=Stallman13>{{cite web|last=Stallman|first=Richard|title=Can You Trust Your Computer?|url=https://www.gnu.org/philosophy/can-you-trust.html|work=gnu.org|access-date=12 August 2013}}</ref><ref>{{Cite web |last=scl-paullauria |date=2017-01-23 |title=Trust me, I'm a computer |url=https://www.scl.org/3835-trust-me-i-m-a-computer/ |access-date=2024-04-03 |website=Society for Computers & Law |language=en-GB}}</ref> and certain scholarly articles to use [[scare quotes]] when referring to the technology.<ref name="anderson2">{{Cite book|volume=12|url=https://doi.org/10.1007/1-4020-8090-5_3|title=Cryptography and Competition Policy - Issues with 'Trusted Computing', in Economics of Information Security|first=Ross|last=Anderson|editor-first1=L. Jean|editor-last1=Camp|editor-first2=Stephen|editor-last2=Lewis|date=November 15, 2004|publisher=Springer US|pages=35β52|via=Springer Link|doi=10.1007/1-4020-8090-5_3}}</ref><ref>{{Cite web|url=http://www.cl.cam.ac.uk/~fms27/papers/2003-stajano-shifting.pdf|title=F. Stajano, "Security for whom? The shifting security assumptions of pervasive computing", ''Lecture notes in computer science'', vol. 2609, pp. 16-27, 2003.}}</ref> Trusted Computing proponents such as [[International Data Corporation]],<ref>{{cite web | access-date = 2007-02-07 | first = Shane | last = Rau | url = https://www.trustedcomputinggroup.org/news/Industry_Data/IDC_448_Web.pdf | title = The Trusted Computing Platform Emerges as Industry's First Comprehensive Approach to IT Security | work = IDC Executive Brief | publisher = International Data Corporation |date=February 2006}}</ref> the Enterprise Strategy Group<ref>{{cite web | title = Trusted Enterprise Security: How the Trusted Computing Group (TCG) Will Advance Enterprise Security | work = White Paper | publisher = Enterprise Strategy Group | first = Jon | last = Oltsik |date=January 2006 | url = https://www.trustedcomputinggroup.org/news/Industry_Data/ESG_White_Paper.pdf | access-date = 2007-02-07 }}</ref> and Endpoint Technologies Associates<ref>{{cite web | url = https://www.trustedcomputinggroup.org/news/Industry_Data/Implementing_Trusted_Computing_RK.pdf | title = How to Implement Trusted Computing: A Guide to Tighter Enterprise Security | first = Roger L. | last = Kay |year=2006 | publisher = Endpoint Technologies Associates | access-date = 2007-02-07 }}</ref> state that the technology will make computers safer, less prone to [[Computer virus|viruses]] and [[malware]], and thus more reliable from an end-user perspective. They also state that Trusted Computing will allow [[computers]] and [[Server (computing)|server]]s to offer improved [[computer security]] over that which is currently available. Opponents often state that this technology will be used primarily to enforce [[digital rights management]] policies (imposed restrictions to the owner) and not to increase computer security.<ref name=Stallman13 /><ref name="Anderson"/>{{Rp|23|date=May 2009}} Chip manufacturers [[Intel]] and [[AMD]], hardware manufacturers such as [[Hewlett-Packard|HP]] and [[Dell]], and [[operating system]] providers such as [[Microsoft]] include Trusted Computing in their products if enabled.<ref>{{cite web | quote = TPMs [Trusted Platform Modules] from various semiconductor vendors are included on enterprise desktop and notebook systems from Dell and other vendors | title = Enhancing IT Security with Trusted Computing Group standards | work = Dell Power Solutions |date=November 2006 | url = http://www.dell.com/downloads/global/power/ps4q06-20070160-tcg.pdf | page = 14 | access-date = 2006-02-07 }}</ref><ref>{{cite web | quote = Windows Vista provides a set of services for applications that use TPM technologies. | url = http://www.microsoft.com/whdc/system/platform/pcdesign/TPM_secure.mspx | title = Trusted Platform Module Services in Windows Vista | date = 2005-04-25 | work = Windows Hardware Development Central | access-date = 2007-02-07 | publisher = [[Microsoft]] |archive-url = https://web.archive.org/web/20070515072944/http://www.microsoft.com/whdc/system/platform/pcdesign/TPM_secure.mspx <!-- Bot retrieved archive --> |archive-date = 2007-05-15}}</ref> The [[U.S. Army]] requires that every new PC it purchases comes with a [[Trusted Platform Module]] (TPM).<ref>{{cite news | url = http://www.securityfocus.com/brief/265 | title = U.S. Army requires trusted computing | publisher = Security Focus | date = 2006-07-28 | first = Robert | last = Lemos | access-date = 2007-02-07 }}</ref><ref>{{cite web | url = http://www.army.mil/ciog6/news/500Day2006Update.pdf | archive-url = https://web.archive.org/web/20061018034556/http://www.army.mil/ciog6/news/500Day2006Update.pdf | url-status = dead | archive-date = October 18, 2006 | quote = Strategic goal n. 3, 'deliver a joint netcentric information that enables warfighter decision superiority' |date=October 2006 | title = Army CIO/G-6 500-day plan | publisher = [[U.S. Army]] | access-date = 2007-02-07 }}</ref> As of July 3, 2007, so does virtually the entire [[United States Department of Defense]].<ref>[http://iase.disa.mil/policy-guidance/dod-dar-tpm-decree07-03-07.pdf encryption of unclassified data] {{Webarchive|url=https://web.archive.org/web/20070927060332/http://iase.disa.mil/policy-guidance/dod-dar-tpm-decree07-03-07.pdf |date=2007-09-27 }}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)