Trusted Computing explained #

This animation by Benjamin Stephan and Lutz Vogel makes Trusted Computing/TPM crystal clear (hint: it ain't pretty). The low bandwidth summary, courtesy of RMS:
"Treacherous computing" is a more appropriate name, because the plan is designed to make sure your computer will systematically disobey you. In fact, it is designed to stop your computer from functioning as a general-purpose computer. Every operation may require explicit permission.

/misc | Dec 14, 2005


Subscribe or visit the archives.