CINXE.COM

Trusted Computing - Wikipedia

<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-sticky-header-enabled vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Trusted Computing - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-sticky-header-enabled vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy","wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"724189f9-44fb-4703-96f8-2a75668b11de","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Trusted_Computing","wgTitle":"Trusted Computing","wgCurRevisionId":1270660346,"wgRevisionId":1270660346,"wgArticleId":58608,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["Webarchive template wayback links","CS1 German-language sources (de)","CS1 maint: multiple names: authors list","Articles with short description","Short description matches Wikidata","All Wikipedia articles needing clarification","Wikipedia articles needing clarification from March 2015","Articles needing cleanup from July 2014","All pages needing cleanup","Wikipedia list cleanup from July 2014","Cryptography","Copyright law","Trusted computing","Microsoft Windows security technology"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Trusted_Computing","wgRelevantArticleId":58608,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":40000,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q966812","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGELevelingUpEnabledForUser":false}; RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready"};RLPAGEMODULES=["ext.cite.ux-enhancements","site","mediawiki.page.ready","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.quicksurveys.init","ext.growthExperiments.SuggestedEditSession"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=ext.cite.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediamessages.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&amp;only=styles&amp;skin=vector-2022"> <script async="" src="/w/load.php?lang=en&amp;modules=startup&amp;only=scripts&amp;raw=1&amp;skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=site.styles&amp;only=styles&amp;skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.22"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Trusted Computing - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Trusted_Computing"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Trusted_Computing&amp;action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Trusted_Computing"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&amp;feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="auth.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Trusted_Computing rootpage-Trusted_Computing skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" title="Main menu" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li><li id="n-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages"><span>Special pages</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page&#039;s font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/?wmf_source=donate&amp;wmf_medium=sidebar&amp;wmf_campaign=en.wikipedia.org&amp;uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&amp;returnto=Trusted+Computing" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&amp;returnto=Trusted+Computing" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/?wmf_source=donate&amp;wmf_medium=sidebar&amp;wmf_campaign=en.wikipedia.org&amp;uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&amp;returnto=Trusted+Computing" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&amp;returnto=Trusted+Computing" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-Key_concepts" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Key_concepts"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>Key concepts</span> </div> </a> <button aria-controls="toc-Key_concepts-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Key concepts subsection</span> </button> <ul id="toc-Key_concepts-sublist" class="vector-toc-list"> <li id="toc-Endorsement_key" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Endorsement_key"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.1</span> <span>Endorsement key</span> </div> </a> <ul id="toc-Endorsement_key-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Memory_curtaining" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Memory_curtaining"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.2</span> <span>Memory curtaining</span> </div> </a> <ul id="toc-Memory_curtaining-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Sealed_storage" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Sealed_storage"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.3</span> <span>Sealed storage</span> </div> </a> <ul id="toc-Sealed_storage-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Remote_attestation" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Remote_attestation"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.4</span> <span>Remote attestation</span> </div> </a> <ul id="toc-Remote_attestation-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Trusted_third_party" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Trusted_third_party"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.5</span> <span>Trusted third party</span> </div> </a> <ul id="toc-Trusted_third_party-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Known_applications" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Known_applications"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Known applications</span> </div> </a> <ul id="toc-Known_applications-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Possible_applications" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Possible_applications"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Possible applications</span> </div> </a> <button aria-controls="toc-Possible_applications-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Possible applications subsection</span> </button> <ul id="toc-Possible_applications-sublist" class="vector-toc-list"> <li id="toc-Digital_rights_management" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Digital_rights_management"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1</span> <span>Digital rights management</span> </div> </a> <ul id="toc-Digital_rights_management-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Preventing_cheating_in_online_games" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Preventing_cheating_in_online_games"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2</span> <span>Preventing cheating in online games</span> </div> </a> <ul id="toc-Preventing_cheating_in_online_games-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Verification_of_remote_computation_for_grid_computing" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Verification_of_remote_computation_for_grid_computing"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.3</span> <span>Verification of remote computation for grid computing</span> </div> </a> <ul id="toc-Verification_of_remote_computation_for_grid_computing-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Criticism" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Criticism"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Criticism</span> </div> </a> <button aria-controls="toc-Criticism-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Criticism subsection</span> </button> <ul id="toc-Criticism-sublist" class="vector-toc-list"> <li id="toc-Digital_rights_management_2" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Digital_rights_management_2"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1</span> <span>Digital rights management</span> </div> </a> <ul id="toc-Digital_rights_management_2-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Users_unable_to_modify_software" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Users_unable_to_modify_software"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2</span> <span>Users unable to modify software</span> </div> </a> <ul id="toc-Users_unable_to_modify_software-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Users_unable_to_exercise_legal_rights" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Users_unable_to_exercise_legal_rights"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.3</span> <span>Users unable to exercise legal rights</span> </div> </a> <ul id="toc-Users_unable_to_exercise_legal_rights-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Users_vulnerable_to_vendor_withdrawal_of_service" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Users_vulnerable_to_vendor_withdrawal_of_service"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.4</span> <span>Users vulnerable to vendor withdrawal of service</span> </div> </a> <ul id="toc-Users_vulnerable_to_vendor_withdrawal_of_service-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Users_unable_to_override" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Users_unable_to_override"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.5</span> <span>Users unable to override</span> </div> </a> <ul id="toc-Users_unable_to_override-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Loss_of_anonymity" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Loss_of_anonymity"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.6</span> <span>Loss of anonymity</span> </div> </a> <ul id="toc-Loss_of_anonymity-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-TCG_specification_interoperability_problems" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#TCG_specification_interoperability_problems"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.7</span> <span>TCG specification interoperability problems</span> </div> </a> <ul id="toc-TCG_specification_interoperability_problems-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Shutting_out_of_competing_products" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Shutting_out_of_competing_products"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.8</span> <span>Shutting out of competing products</span> </div> </a> <ul id="toc-Shutting_out_of_competing_products-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Trust" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Trust"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.9</span> <span>Trust</span> </div> </a> <ul id="toc-Trust-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Hardware_and_software_support" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Hardware_and_software_support"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>Hardware and software support</span> </div> </a> <ul id="toc-Hardware_and_software_support-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" title="Table of Contents" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Trusted Computing</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 16 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-16" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">16 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/Trusted_Computing" title="Trusted Computing – Czech" lang="cs" hreflang="cs" data-title="Trusted Computing" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/Trusted_Computing" title="Trusted Computing – German" lang="de" hreflang="de" data-title="Trusted Computing" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/Trusted_Computing" title="Trusted Computing – Estonian" lang="et" hreflang="et" data-title="Trusted Computing" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/Computaci%C3%B3n_confiable" title="Computación confiable – Spanish" lang="es" hreflang="es" data-title="Computación confiable" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D9%85%D8%AD%D8%A7%D8%B3%D8%A8%D8%A7%D8%AA_%D9%82%D8%A7%D8%A8%D9%84_%D8%A7%D8%B9%D8%AA%D9%85%D8%A7%D8%AF" title="محاسبات قابل اعتماد – Persian" lang="fa" hreflang="fa" data-title="محاسبات قابل اعتماد" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/Informatique_de_confiance" title="Informatique de confiance – French" lang="fr" hreflang="fr" data-title="Informatique de confiance" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/Trusted_computing" title="Trusted computing – Italian" lang="it" hreflang="it" data-title="Trusted computing" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-nl mw-list-item"><a href="https://nl.wikipedia.org/wiki/Trusted_computing" title="Trusted computing – Dutch" lang="nl" hreflang="nl" data-title="Trusted computing" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/Trusted_Computing" title="Trusted Computing – Polish" lang="pl" hreflang="pl" data-title="Trusted Computing" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Computa%C3%A7%C3%A3o_confi%C3%A1vel" title="Computação confiável – Portuguese" lang="pt" hreflang="pt" data-title="Computação confiável" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/%D0%94%D0%BE%D0%B2%D0%B5%D1%80%D0%B5%D0%BD%D0%BD%D0%B0%D1%8F_%D0%B7%D0%B0%D0%B3%D1%80%D1%83%D0%B7%D0%BA%D0%B0" title="Доверенная загрузка – Russian" lang="ru" hreflang="ru" data-title="Доверенная загрузка" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-sl mw-list-item"><a href="https://sl.wikipedia.org/wiki/Trusted_Computing" title="Trusted Computing – Slovenian" lang="sl" hreflang="sl" data-title="Trusted Computing" data-language-autonym="Slovenščina" data-language-local-name="Slovenian" class="interlanguage-link-target"><span>Slovenščina</span></a></li><li class="interlanguage-link interwiki-sv mw-list-item"><a href="https://sv.wikipedia.org/wiki/Trusted_Computing" title="Trusted Computing – Swedish" lang="sv" hreflang="sv" data-title="Trusted Computing" data-language-autonym="Svenska" data-language-local-name="Swedish" class="interlanguage-link-target"><span>Svenska</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/%D0%94%D0%BE%D0%B2%D1%96%D1%80%D0%B5%D0%BD%D0%B5_%D0%BE%D0%B1%D1%87%D0%B8%D1%81%D0%BB%D0%B5%D0%BD%D0%BD%D1%8F" title="Довірене обчислення – Ukrainian" lang="uk" hreflang="uk" data-title="Довірене обчислення" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-vec mw-list-item"><a href="https://vec.wikipedia.org/wiki/Trusted_computing" title="Trusted computing – Venetian" lang="vec" hreflang="vec" data-title="Trusted computing" data-language-autonym="Vèneto" data-language-local-name="Venetian" class="interlanguage-link-target"><span>Vèneto</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E5%8F%AF%E4%BF%A1%E8%AE%A1%E7%AE%97" title="可信计算 – Chinese" lang="zh" hreflang="zh" data-title="可信计算" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q966812#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Trusted_Computing" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Trusted_Computing" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Trusted_Computing"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Trusted_Computing&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Trusted_Computing&amp;action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Trusted_Computing"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Trusted_Computing&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Trusted_Computing&amp;action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Trusted_Computing" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Trusted_Computing" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Trusted_Computing&amp;oldid=1270660346" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Trusted_Computing&amp;action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&amp;page=Trusted_Computing&amp;id=1270660346&amp;wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FTrusted_Computing"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FTrusted_Computing"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&amp;page=Trusted_Computing&amp;action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Trusted_Computing&amp;printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q966812" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Technology developed and promoted by the Trusted Computing Group</div> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">Not to be confused with <a href="/wiki/Trusted_computing_base" title="Trusted computing base">Trusted computing base</a> or <a href="/wiki/Trustworthy_computing" title="Trustworthy computing">Trustworthy computing</a>.</div> <p><b>Trusted Computing</b> (<b>TC</b>) is a technology developed and promoted by the <a href="/wiki/Trusted_Computing_Group" title="Trusted Computing Group">Trusted Computing Group</a>.<sup id="cite_ref-mitchell_1-0" class="reference"><a href="#cite_note-mitchell-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup> The term is taken from the field of <a href="/wiki/Trusted_system" title="Trusted system">trusted systems</a> and has a specialized meaning that is distinct from the field of <a href="/wiki/Confidential_computing" title="Confidential computing">confidential computing</a>.<sup id="cite_ref-ccc_2-0" class="reference"><a href="#cite_note-ccc-2"><span class="cite-bracket">&#91;</span>2<span class="cite-bracket">&#93;</span></a></sup> With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by <a href="/wiki/Computer_hardware" title="Computer hardware">computer hardware</a> and <a href="/wiki/Software" title="Software">software</a>.<sup id="cite_ref-mitchell_1-1" class="reference"><a href="#cite_note-mitchell-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup> Enforcing this behavior is achieved by loading the hardware with a unique <a href="/wiki/Encryption_key" class="mw-redirect" title="Encryption key">encryption key</a> that is inaccessible to the rest of the system and the owner. </p><p>TC is controversial as the hardware is not only secured for its owner, but also against its owner, leading opponents of the technology like <a href="/wiki/Free_software" title="Free software">free software</a> activist <a href="/wiki/Richard_Stallman" title="Richard Stallman">Richard Stallman</a> to deride it as "treacherous computing",<sup id="cite_ref-Stallman13_3-0" class="reference"><a href="#cite_note-Stallman13-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-4" class="reference"><a href="#cite_note-4"><span class="cite-bracket">&#91;</span>4<span class="cite-bracket">&#93;</span></a></sup> and certain scholarly articles to use <a href="/wiki/Scare_quotes" title="Scare quotes">scare quotes</a> when referring to the technology.<sup id="cite_ref-anderson2_5-0" class="reference"><a href="#cite_note-anderson2-5"><span class="cite-bracket">&#91;</span>5<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">&#91;</span>6<span class="cite-bracket">&#93;</span></a></sup> </p><p>Trusted Computing proponents such as <a href="/wiki/International_Data_Corporation" class="mw-redirect" title="International Data Corporation">International Data Corporation</a>,<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">&#91;</span>7<span class="cite-bracket">&#93;</span></a></sup> the Enterprise Strategy Group<sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">&#91;</span>8<span class="cite-bracket">&#93;</span></a></sup> and Endpoint Technologies Associates<sup id="cite_ref-9" class="reference"><a href="#cite_note-9"><span class="cite-bracket">&#91;</span>9<span class="cite-bracket">&#93;</span></a></sup> state that the technology will make computers safer, less prone to <a href="/wiki/Computer_virus" title="Computer virus">viruses</a> and <a href="/wiki/Malware" title="Malware">malware</a>, and thus more reliable from an end-user perspective. They also state that Trusted Computing will allow <a href="/wiki/Computers" class="mw-redirect" title="Computers">computers</a> and <a href="/wiki/Server_(computing)" title="Server (computing)">servers</a> to offer improved <a href="/wiki/Computer_security" title="Computer security">computer security</a> over that which is currently available. Opponents often state that this technology will be used primarily to enforce <a href="/wiki/Digital_rights_management" title="Digital rights management">digital rights management</a> policies (imposed restrictions to the owner) and not to increase computer security.<sup id="cite_ref-Stallman13_3-1" class="reference"><a href="#cite_note-Stallman13-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-Anderson_10-0" class="reference"><a href="#cite_note-Anderson-10"><span class="cite-bracket">&#91;</span>10<span class="cite-bracket">&#93;</span></a></sup><sup class="reference nowrap"><span title="Page / location: 23">&#58;&#8202;23&#8202;</span></sup> </p><p>Chip manufacturers <a href="/wiki/Intel" title="Intel">Intel</a> and <a href="/wiki/AMD" title="AMD">AMD</a>, hardware manufacturers such as <a href="/wiki/Hewlett-Packard" title="Hewlett-Packard">HP</a> and <a href="/wiki/Dell" title="Dell">Dell</a>, and <a href="/wiki/Operating_system" title="Operating system">operating system</a> providers such as <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a> include Trusted Computing in their products if enabled.<sup id="cite_ref-11" class="reference"><a href="#cite_note-11"><span class="cite-bracket">&#91;</span>11<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">&#91;</span>12<span class="cite-bracket">&#93;</span></a></sup> The <a href="/wiki/U.S._Army" class="mw-redirect" title="U.S. Army">U.S. Army</a> requires that every new PC it purchases comes with a <a href="/wiki/Trusted_Platform_Module" title="Trusted Platform Module">Trusted Platform Module</a> (TPM).<sup id="cite_ref-13" class="reference"><a href="#cite_note-13"><span class="cite-bracket">&#91;</span>13<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-14" class="reference"><a href="#cite_note-14"><span class="cite-bracket">&#91;</span>14<span class="cite-bracket">&#93;</span></a></sup> As of July 3, 2007, so does virtually the entire <a href="/wiki/United_States_Department_of_Defense" title="United States Department of Defense">United States Department of Defense</a>.<sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">&#91;</span>15<span class="cite-bracket">&#93;</span></a></sup> </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="Key_concepts">Key concepts</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=1" title="Edit section: Key concepts"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Trusted Computing encompasses six key technology concepts, of which all are required for a fully Trusted system, that is, a system compliant to the TCG specifications: </p> <ol><li>Endorsement key</li> <li>Secure input and output</li> <li>Memory curtaining / protected execution</li> <li>Sealed storage</li> <li>Remote attestation</li> <li>Trusted Third Party (TTP)</li></ol> <div class="mw-heading mw-heading3"><h3 id="Endorsement_key"><span class="anchor" id="ENDORSEMENT-KEY"></span>Endorsement key</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=2" title="Edit section: Endorsement key"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The endorsement key is a 2048-bit <a href="/wiki/RSA_(algorithm)" class="mw-redirect" title="RSA (algorithm)">RSA</a> public and private key pair that is created randomly on the chip at manufacture time and cannot be changed. The private key never leaves the chip, while the public key is used for attestation and for encryption of sensitive data sent to the chip, as occurs during the TPM_TakeOwnership command.<sup id="cite_ref-16" class="reference"><a href="#cite_note-16"><span class="cite-bracket">&#91;</span>16<span class="cite-bracket">&#93;</span></a></sup> </p><p>This key is used to allow the execution of secure transactions: every Trusted Platform Module (TPM) is required to be able to sign a random number (in order to allow the owner to show that he has a genuine trusted computer), using a particular protocol created by the Trusted Computing Group (the <a href="/wiki/Direct_anonymous_attestation" class="mw-redirect" title="Direct anonymous attestation">direct anonymous attestation</a> protocol) in order to ensure its compliance of the TCG standard and to prove its identity; this makes it impossible for a software TPM emulator with an untrusted endorsement key (for example, a self-generated one) to start a secure transaction with a trusted entity. The TPM should be<sup class="noprint Inline-Template" style="margin-left:0.1em; white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Vagueness" title="Wikipedia:Vagueness"><span title="This information is too vague. (March 2015)">vague</span></a></i>&#93;</sup> designed to make the extraction of this key by hardware analysis hard, but <a href="/wiki/Tamper_resistance" class="mw-redirect" title="Tamper resistance">tamper resistance</a> is not a strong requirement. </p> <div class="mw-heading mw-heading3"><h3 id="Memory_curtaining">Memory curtaining</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=3" title="Edit section: Memory curtaining"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Memory curtaining extends common <a href="/wiki/Memory_protection" title="Memory protection">memory protection</a> techniques to provide full isolation of sensitive areas of memory—for example, locations containing cryptographic keys. Even the <a href="/wiki/Operating_system" title="Operating system">operating system</a> does not have full access to curtained memory. The exact implementation details are vendor specific. </p> <div class="mw-heading mw-heading3"><h3 id="Sealed_storage"><span class="anchor" id="SEALED-STORAGE"></span>Sealed storage</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=4" title="Edit section: Sealed storage"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Sealed storage protects private information by binding it to platform configuration information including the software and hardware being used. This means the data can be released only to a particular combination of software and hardware. Sealed storage can be used for DRM enforcing. For example, users who keep a song on their computer that has not been licensed to be listened will not be able to play it. Currently, a user can locate the song, listen to it, and send it to someone else, play it in the software of their choice, or back it up (and in some cases, use circumvention software to decrypt it). Alternatively, the user may use software to modify the operating system's DRM routines to have it leak the song data once, say, a temporary license was acquired. Using sealed storage, the song is securely encrypted using a key bound to the trusted platform module so that only the unmodified and untampered music player on his or her computer can play it. In this DRM architecture, this might also prevent people from listening to the song after buying a new computer, or upgrading parts of their current one, except after explicit permission of the vendor of the song. </p> <div class="mw-heading mw-heading3"><h3 id="Remote_attestation"><span class="anchor" id="REMOTE-ATTESTATION"></span>Remote attestation</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=5" title="Edit section: Remote attestation"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Remote attestation allows changes to the user's computer to be detected by authorized parties. For example, software companies can identify unauthorized changes to software, including users modifying their software to circumvent commercial digital rights restrictions. It works by having the hardware generate a certificate stating what software is currently running. The computer can then present this certificate to a remote party to show that unaltered software is currently executing. Numerous remote attestation schemes have been proposed for various computer architectures, including Intel,<sup id="cite_ref-17" class="reference"><a href="#cite_note-17"><span class="cite-bracket">&#91;</span>17<span class="cite-bracket">&#93;</span></a></sup> RISC-V,<sup id="cite_ref-18" class="reference"><a href="#cite_note-18"><span class="cite-bracket">&#91;</span>18<span class="cite-bracket">&#93;</span></a></sup> and ARM.<sup id="cite_ref-19" class="reference"><a href="#cite_note-19"><span class="cite-bracket">&#91;</span>19<span class="cite-bracket">&#93;</span></a></sup> </p><p>Remote attestation is usually combined with public-key encryption so that the information sent can only be read by the programs that requested the attestation, and not by an eavesdropper. </p><p>To take the song example again, the user's music player software could send the song to other machines, but only if they could attest that they were running an authorized copy of the music player software. Combined with the other technologies, this provides a more restricted path for the music: encrypted I/O prevents the user from recording it as it is transmitted to the audio subsystem, memory locking prevents it from being dumped to regular disk files as it is being worked on, sealed storage curtails unauthorized access to it when saved to the hard drive, and remote attestation prevents unauthorized software from accessing the song even when it is used on other computers. To preserve the privacy of attestation responders, <a href="/wiki/Direct_Anonymous_Attestation" title="Direct Anonymous Attestation">Direct Anonymous Attestation</a> has been proposed as a solution, which uses a group signature scheme to prevent revealing the identity of individual signers. </p><p><a href="/wiki/Proof_of_space" title="Proof of space">Proof of space</a> (PoS) have been proposed to be used for malware detection, by determining whether the L1 cache of a processor is empty (e.g., has enough space to evaluate the PoSpace routine without cache misses) or contains a routine that resisted being evicted.<sup id="cite_ref-JakobssonStewart13_20-0" class="reference"><a href="#cite_note-JakobssonStewart13-20"><span class="cite-bracket">&#91;</span>20<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span class="cite-bracket">&#91;</span>21<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Trusted_third_party">Trusted third party</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=6" title="Edit section: Trusted third party"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951" /><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Trusted_third_party" title="Trusted third party">Trusted third party</a></div> <div class="mw-heading mw-heading2"><h2 id="Known_applications">Known applications</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=7" title="Edit section: Known applications"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The Microsoft products <a href="/wiki/Windows_Vista" title="Windows Vista">Windows Vista</a>, <a href="/wiki/Windows_7" title="Windows 7">Windows 7</a>, <a href="/wiki/Windows_8" title="Windows 8">Windows 8</a> and <a href="/wiki/Windows_RT" title="Windows RT">Windows RT</a> make use of a Trusted Platform Module to facilitate <a href="/wiki/BitLocker_Drive_Encryption" class="mw-redirect" title="BitLocker Drive Encryption">BitLocker Drive Encryption</a>.<sup id="cite_ref-bitlocker_22-0" class="reference"><a href="#cite_note-bitlocker-22"><span class="cite-bracket">&#91;</span>22<span class="cite-bracket">&#93;</span></a></sup> Other known applications with runtime encryption and the use of secure enclaves include the <a href="/wiki/Signal_(messaging_app)" class="mw-redirect" title="Signal (messaging app)">Signal messenger</a><sup id="cite_ref-23" class="reference"><a href="#cite_note-23"><span class="cite-bracket">&#91;</span>23<span class="cite-bracket">&#93;</span></a></sup> and the <a href="/wiki/Electronic_prescribing" title="Electronic prescribing">e-prescription</a> service ("E-Rezept")<sup id="cite_ref-24" class="reference"><a href="#cite_note-24"><span class="cite-bracket">&#91;</span>24<span class="cite-bracket">&#93;</span></a></sup> by the German government. </p> <div class="mw-heading mw-heading2"><h2 id="Possible_applications">Possible applications</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=8" title="Edit section: Possible applications"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="Digital_rights_management">Digital rights management</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=9" title="Edit section: Digital rights management"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Trusted Computing would allow companies to create a digital rights management (DRM) system which would be very hard to circumvent, though not impossible. An example is downloading a music file. Sealed storage could be used to prevent the user from opening the file with an unauthorized player or computer. Remote attestation could be used to authorize play only by music players that enforce the record company's rules. The music would be played from curtained memory, which would prevent the user from making an unrestricted copy of the file while it is playing, and secure I/O would prevent capturing what is being sent to the sound system. Circumventing such a system would require either manipulation of the computer's hardware, capturing the analogue (and thus degraded) signal using a recording device or a microphone, or breaking the security of the system. </p><p>New business models for use of software (services) over Internet may be boosted by the technology. By strengthening the DRM system, one could base a business model on renting programs for a specific time periods or "pay as you go" models. For instance, one could download a music file which could only be played a certain number of times before it becomes unusable, or the music file could be used only within a certain time period. </p> <div class="mw-heading mw-heading3"><h3 id="Preventing_cheating_in_online_games">Preventing cheating in online games</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=10" title="Edit section: Preventing cheating in online games"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Trusted Computing could be used to combat <a href="/wiki/Cheating_in_online_games" title="Cheating in online games">cheating in online games</a>. Some players modify their game copy in order to gain unfair advantages in the game; remote attestation, secure I/O and memory curtaining could be used to determine that all players connected to a server were running an unmodified copy of the software.<sup id="cite_ref-25" class="reference"><a href="#cite_note-25"><span class="cite-bracket">&#91;</span>25<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Verification_of_remote_computation_for_grid_computing">Verification of remote computation for grid computing</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=11" title="Edit section: Verification of remote computation for grid computing"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Trusted Computing could be used to guarantee participants in a <a href="/wiki/Grid_computing" title="Grid computing">grid computing</a> system are returning the results of the computations they claim to be instead of forging them. This would allow large scale simulations to be run (say a climate simulation) without expensive redundant computations to guarantee malicious hosts are not undermining the results to achieve the conclusion they want.<sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">&#91;</span>26<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Criticism">Criticism</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=12" title="Edit section: Criticism"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The <a href="/wiki/Electronic_Frontier_Foundation" title="Electronic Frontier Foundation">Electronic Frontier Foundation</a> and the <a href="/wiki/Free_Software_Foundation" title="Free Software Foundation">Free Software Foundation</a> criticize that trust in the underlying companies is not deserved and that the technology puts too much power and control into the hands of those who design systems and software. They also state that it may cause consumers to lose anonymity in their online interactions, as well as mandating technologies Trusted Computing opponents say are unnecessary. They suggest Trusted Computing as a possible enabler for future versions of <a href="/wiki/Mandatory_access_control" title="Mandatory access control">mandatory access control</a>, <a href="/wiki/Copy_protection" title="Copy protection">copy protection</a>, and DRM. </p><p>Some security experts, such as <a href="/wiki/Alan_Cox_(computer_programmer)" title="Alan Cox (computer programmer)">Alan Cox</a><sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">&#91;</span>27<span class="cite-bracket">&#93;</span></a></sup> and <a href="/wiki/Bruce_Schneier" title="Bruce Schneier">Bruce Schneier</a>,<sup id="cite_ref-Schneier_28-0" class="reference"><a href="#cite_note-Schneier-28"><span class="cite-bracket">&#91;</span>28<span class="cite-bracket">&#93;</span></a></sup> have spoken out against Trusted Computing, believing it will provide computer manufacturers and software authors with increased control to impose restrictions on what users are able to do with their computers. There are concerns that Trusted Computing would have an <a href="/wiki/Anti-competitive_practices" title="Anti-competitive practices">anti-competitive</a> effect on the IT market.<sup id="cite_ref-Anderson_10-1" class="reference"><a href="#cite_note-Anderson-10"><span class="cite-bracket">&#91;</span>10<span class="cite-bracket">&#93;</span></a></sup> </p><p>There is concern amongst critics that it will not always be possible to examine the hardware components on which Trusted Computing relies, the <a href="/wiki/Trusted_Platform_Module" title="Trusted Platform Module">Trusted Platform Module</a>, which is the ultimate hardware system where the core 'root' of trust in the platform has to reside.<sup id="cite_ref-Anderson_10-2" class="reference"><a href="#cite_note-Anderson-10"><span class="cite-bracket">&#91;</span>10<span class="cite-bracket">&#93;</span></a></sup> If not implemented correctly, it presents a security risk to overall platform integrity and protected data. The specifications, as published by the <a href="/wiki/Trusted_Computing_Group" title="Trusted Computing Group">Trusted Computing Group</a>, are open and are available for anyone to review. However, the final implementations by commercial vendors will not necessarily be subjected to the same review process. In addition, the world of cryptography can often move quickly, and that hardware implementations of algorithms might create an inadvertent obsolescence. Trusting networked computers to controlling authorities rather than to individuals may create <a href="/wiki/Digital_imprimatur" class="mw-redirect" title="Digital imprimatur">digital imprimaturs</a>. </p><p>Cryptographer <a href="/wiki/Ross_J._Anderson" title="Ross J. Anderson">Ross Anderson</a>, University of Cambridge, has great concerns that:<sup id="cite_ref-Anderson_10-3" class="reference"><a href="#cite_note-Anderson-10"><span class="cite-bracket">&#91;</span>10<span class="cite-bracket">&#93;</span></a></sup> </p> <blockquote><p>TC can support remote censorship [...] In general, digital objects created using TC systems remain under the control of their creators, rather than under the control of the person who owns the machine on which they happen to be stored [...] So someone who writes a paper that a court decides is defamatory can be compelled to censor it — and the software company that wrote the word processor could be ordered to do the deletion if she refuses. Given such possibilities, we can expect TC to be used to suppress everything from pornography to writings that criticize political leaders.</p></blockquote> <p>He goes on to state that: </p> <blockquote><p>[...] software suppliers can make it much harder for you to switch to their competitors' products. At a simple level, Word could encrypt all your documents using keys that only Microsoft products have access to; this would mean that you could only read them using Microsoft products, not with any competing word processor. [...]</p></blockquote> <blockquote><p>The [...] most important benefit for Microsoft is that TC will dramatically increase the costs of switching away from Microsoft products (such as Office) to rival products (such as <a href="/wiki/OpenOffice.org" title="OpenOffice.org">OpenOffice</a>). For example, a law firm that wants to change from Office to OpenOffice right now merely has to install the software, train the staff and convert their existing files. In five years' time, once they have received TC-protected documents from perhaps a thousand different clients, they would have to get permission (in the form of signed digital certificates) from each of these clients in order to migrate their files to a new platform. The law firm won't in practice want to do this, so they will be much more tightly locked in, which will enable Microsoft to hike its prices.</p></blockquote> <p>Anderson summarizes the case by saying: </p> <blockquote><p>The fundamental issue is that whoever controls the TC infrastructure will acquire a huge amount of power. Having this single point of control is like making everyone use the same bank, or the same accountant, or the same lawyer. There are many ways in which this power could be abused.</p></blockquote> <div class="mw-heading mw-heading3"><h3 id="Digital_rights_management_2">Digital rights management</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=13" title="Edit section: Digital rights management"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>One of the early motivations behind trusted computing was a desire by media and software corporations for stricter DRM technology to prevent users from freely sharing and using potentially copyrighted or private files without explicit permission. An example could be downloading a music file from a band: the band's record company could come up with rules for how the band's music can be used. For example, they might want the user to play the file only three times a day without paying additional money. Also, they could use remote attestation to only send their music to a music player that enforces their rules: sealed storage would prevent the user from opening the file with another player that did not enforce the restrictions. Memory curtaining would prevent the user from making an unrestricted copy of the file while it is playing, and secure output would prevent capturing what is sent to the sound system. </p> <div class="mw-heading mw-heading3"><h3 id="Users_unable_to_modify_software">Users unable to modify software</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=14" title="Edit section: Users unable to modify software"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>A user who wanted to switch to a competing program might find that it would be impossible for that new program to read old data, as the information would be "<a href="/wiki/Vendor_lock-in" title="Vendor lock-in">locked in</a>" to the old program. It could also make it impossible for the user to read or modify their data except as specifically permitted by the software. </p> <div class="mw-heading mw-heading3"><h3 id="Users_unable_to_exercise_legal_rights">Users unable to exercise legal rights</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=15" title="Edit section: Users unable to exercise legal rights"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The law in many countries allows users certain rights over data whose copyright they do not own (including text, images, and other media), often under headings such as <a href="/wiki/Fair_use" title="Fair use">fair use</a> or <a href="/wiki/Public_interest" title="Public interest">public interest</a>. Depending on jurisdiction, these may cover issues such as <a href="/wiki/Whistleblowing" title="Whistleblowing">whistleblowing</a>, production of evidence in court, quoting or other small-scale usage, <a href="/wiki/Backup" title="Backup">backups</a> of owned media, and making a copy of owned material for personal use on other owned devices or systems. The steps implicit in trusted computing have the practical effect of preventing users exercising these legal rights.<sup id="cite_ref-Stallman13_3-2" class="reference"><a href="#cite_note-Stallman13-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Users_vulnerable_to_vendor_withdrawal_of_service">Users vulnerable to vendor withdrawal of service</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=16" title="Edit section: Users vulnerable to vendor withdrawal of service"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>A service that requires external validation or permission - such as a music file or game that requires connection with the vendor to confirm permission to play or use - is vulnerable to that service being withdrawn or no longer updated. A number of incidents have already occurred where users, having purchased music or video media, have found their ability to watch or listen to it suddenly stop due to vendor policy or cessation of service,<sup id="cite_ref-ms_drm_29-0" class="reference"><a href="#cite_note-ms_drm-29"><span class="cite-bracket">&#91;</span>29<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span class="cite-bracket">&#91;</span>30<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">&#91;</span>31<span class="cite-bracket">&#93;</span></a></sup> or server inaccessibility,<sup id="cite_ref-32" class="reference"><a href="#cite_note-32"><span class="cite-bracket">&#91;</span>32<span class="cite-bracket">&#93;</span></a></sup> at times with no compensation.<sup id="cite_ref-33" class="reference"><a href="#cite_note-33"><span class="cite-bracket">&#91;</span>33<span class="cite-bracket">&#93;</span></a></sup> Alternatively in some cases the vendor refuses to provide services in future which leaves purchased material only usable on the present -and increasingly obsolete- hardware (so long as it lasts) but not on any hardware that may be purchased in future.<sup id="cite_ref-ms_drm_29-1" class="reference"><a href="#cite_note-ms_drm-29"><span class="cite-bracket">&#91;</span>29<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Users_unable_to_override">Users unable to override</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=17" title="Edit section: Users unable to override"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Some opponents of Trusted Computing advocate "owner override": allowing an owner who is confirmed to be physically present to allow the computer to bypass restrictions and use the secure I/O path. Such an override would allow remote attestation to a user's specification, e.g., to create certificates that say Internet Explorer is running, even if a different browser is used. Instead of preventing software change, remote attestation would indicate when the software has been changed without owner's permission. </p><p><a href="/wiki/Trusted_Computing_Group" title="Trusted Computing Group">Trusted Computing Group</a> members have refused to implement owner override.<sup id="cite_ref-34" class="reference"><a href="#cite_note-34"><span class="cite-bracket">&#91;</span>34<span class="cite-bracket">&#93;</span></a></sup> Proponents of trusted computing believe that owner override defeats the trust in other computers since remote attestation can be forged by the owner. Owner override offers the security and enforcement benefits to a machine owner, but does not allow them to trust other computers, because their owners could waive rules or restrictions on their own computers. Under this scenario, once data is sent to someone else's computer, whether it be a diary, a DRM music file, or a joint project, that other person controls what security, if any, their computer will enforce on their copy of those data. This has the potential to undermine the applications of trusted computing to enforce DRM, control cheating in online games and attest to remote computations for <a href="/wiki/Grid_computing" title="Grid computing">grid computing</a>. </p> <div class="mw-heading mw-heading3"><h3 id="Loss_of_anonymity">Loss of anonymity</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=18" title="Edit section: Loss of anonymity"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Because a Trusted Computing equipped computer is able to uniquely attest to its own identity, it will be possible for vendors and others who possess the ability to use the attestation feature to zero in on the identity of the user of TC-enabled software with a high degree of certainty. </p><p>Such a capability is contingent on the reasonable chance that the user at some time provides user-identifying information, whether voluntarily, indirectly, or simply through inference of many seemingly benign pieces of data. (e.g. search records, as shown through simple study of the AOL search records leak<sup id="cite_ref-35" class="reference"><a href="#cite_note-35"><span class="cite-bracket">&#91;</span>35<span class="cite-bracket">&#93;</span></a></sup>). One common way that information can be obtained and linked is when a user registers a computer just after purchase. Another common way is when a user provides identifying information to the website of an affiliate of the vendor. </p><p>While proponents of TC point out that online purchases and credit transactions could potentially be more secure as a result of the remote attestation capability, this may cause the computer user to lose expectations of anonymity when using the Internet. </p><p>Critics point out that this could have a chilling effect on political free speech, the ability of journalists to use anonymous sources, whistle blowing, political blogging and other areas where the public needs protection from retaliation through anonymity. </p><p>The TPM specification offers features and suggested implementations that are meant to address the anonymity requirement. By using a third-party Privacy Certification Authority (PCA), the information that identifies the computer could be held by a trusted third party. Additionally, the use of <a href="/wiki/Direct_anonymous_attestation" class="mw-redirect" title="Direct anonymous attestation">direct anonymous attestation</a> (DAA), introduced in TPM v1.2, allows a client to perform attestation while not revealing any personally identifiable or machine information. </p><p>The kind of data that must be supplied to the TTP in order to get the trusted status is at present not entirely clear, but the TCG itself admits that "attestation is an important TPM function with significant privacy implications".<sup id="cite_ref-36" class="reference"><a href="#cite_note-36"><span class="cite-bracket">&#91;</span>36<span class="cite-bracket">&#93;</span></a></sup> It is, however, clear that both static and dynamic information about the user computer may be supplied (Ekpubkey) to the TTP (v1.1b),<sup id="cite_ref-ReferenceA_37-0" class="reference"><a href="#cite_note-ReferenceA-37"><span class="cite-bracket">&#91;</span>37<span class="cite-bracket">&#93;</span></a></sup> it is not clear what data will be supplied to the “verifier” under v1.2. The static information will uniquely identify the endorser of the platform, model, details of the TPM, and that the platform (PC) complies with the TCG specifications . The dynamic information is described as software running on the computer.<sup id="cite_ref-ReferenceA_37-1" class="reference"><a href="#cite_note-ReferenceA-37"><span class="cite-bracket">&#91;</span>37<span class="cite-bracket">&#93;</span></a></sup> If a program like Windows is registered in the user's name this in turn will uniquely identify the user. Another dimension of privacy infringing capabilities might also be introduced with this new technology; how often you use your programs might be possible information provided to the TTP. In an exceptional, however practical situation, where a user purchases a pornographic movie on the Internet, the purchaser nowadays, must accept the fact that he has to provide credit card details to the provider, thereby possibly risking being identified. With the new technology a purchaser might also risk someone finding out that he (or she) has watched this pornographic movie 1000 times. This adds a new dimension to the possible privacy infringement. The extent of data that will be supplied to the TTP/Verifiers is at present not exactly known, only when the technology is implemented and used will we be able to assess the exact nature and volume of the data that is transmitted. </p> <div class="mw-heading mw-heading3"><h3 id="TCG_specification_interoperability_problems">TCG specification interoperability problems</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=19" title="Edit section: TCG specification interoperability problems"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Trusted Computing requests that all software and hardware vendors will follow the technical specifications released by the <a href="/wiki/Trusted_Computing_Group" title="Trusted Computing Group">Trusted Computing Group</a> in order to allow interoperability between different trusted software stacks. However, since at least mid-2006, there have been interoperability problems between the TrouSerS trusted software stack (released as open source software by <a href="/wiki/IBM" title="IBM">IBM</a>) and <a href="/wiki/Hewlett-Packard" title="Hewlett-Packard">Hewlett-Packard</a>'s stack.<sup id="cite_ref-38" class="reference"><a href="#cite_note-38"><span class="cite-bracket">&#91;</span>38<span class="cite-bracket">&#93;</span></a></sup> Another problem is that the technical specifications are still changing, so it is unclear which is the standard implementation of the trusted stack. </p> <div class="mw-heading mw-heading3"><h3 id="Shutting_out_of_competing_products">Shutting out of competing products</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=20" title="Edit section: Shutting out of competing products"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>People have voiced concerns that trusted computing could be used to keep or discourage users from running software created by companies outside of a small industry group. <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a> has received a great deal<sup class="noprint Inline-Template" style="margin-left:0.1em; white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Vagueness" title="Wikipedia:Vagueness"><span title="This information is too vague. (March 2015)">vague</span></a></i>&#93;</sup> of bad press surrounding their <a href="/wiki/NGSCB" class="mw-redirect" title="NGSCB">Palladium</a> software architecture, evoking comments such as "Few pieces of vaporware have evoked a higher level of fear and uncertainty than Microsoft's Palladium", "Palladium is a plot to take over cyberspace", and "Palladium will keep us from running any software not personally approved by Bill Gates".<sup id="cite_ref-39" class="reference"><a href="#cite_note-39"><span class="cite-bracket">&#91;</span>39<span class="cite-bracket">&#93;</span></a></sup> The concerns about trusted computing being used to shut out competition exist within a broader framework of consumers being concerned about using <a href="/wiki/Product_bundling" title="Product bundling">bundling</a> of products to obscure prices of products and to engage in <a href="/wiki/Anti-competitive_practices" title="Anti-competitive practices">anti-competitive practices</a>.<sup id="cite_ref-anderson2_5-1" class="reference"><a href="#cite_note-anderson2-5"><span class="cite-bracket">&#91;</span>5<span class="cite-bracket">&#93;</span></a></sup> Trusted Computing is seen as harmful or problematic to independent and <a href="/wiki/Open-source_software" title="Open-source software">open source</a> software developers.<sup id="cite_ref-40" class="reference"><a href="#cite_note-40"><span class="cite-bracket">&#91;</span>40<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Trust">Trust</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=21" title="Edit section: Trust"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In the widely used <a href="/wiki/Public-key_cryptography" title="Public-key cryptography">public-key cryptography</a>, creation of keys can be done on the local computer and the creator has complete control over who has access to it, and consequentially their own <a href="/wiki/Security_policy" title="Security policy">security policies</a>.<sup id="cite_ref-41" class="reference"><a href="#cite_note-41"><span class="cite-bracket">&#91;</span>41<span class="cite-bracket">&#93;</span></a></sup> In some proposed encryption-decryption chips, a private/public key is permanently embedded into the hardware when it is manufactured,<sup id="cite_ref-42" class="reference"><a href="#cite_note-42"><span class="cite-bracket">&#91;</span>42<span class="cite-bracket">&#93;</span></a></sup> and hardware manufacturers would have the opportunity to record the key without leaving evidence of doing so. With this key it would be possible to have access to data encrypted with it, and to authenticate as it.<sup id="cite_ref-43" class="reference"><a href="#cite_note-43"><span class="cite-bracket">&#91;</span>43<span class="cite-bracket">&#93;</span></a></sup> It is trivial for a manufacturer to give a copy of this key to the government or the software manufacturers, as the platform must go through steps so that it works with authenticated software. </p><p>Therefore, to trust anything that is authenticated by or encrypted by a TPM or a Trusted computer, an <a href="/wiki/End_user" title="End user">end user</a> has to trust the company that made the chip, the company that designed the chip, the companies allowed to make software for the chip, and the ability and interest of those companies not to compromise the whole process.<sup id="cite_ref-44" class="reference"><a href="#cite_note-44"><span class="cite-bracket">&#91;</span>44<span class="cite-bracket">&#93;</span></a></sup> A security breach breaking that chain of trust happened to a <a href="/wiki/SIM_card" title="SIM card">SIM card</a> manufacturer <a href="/wiki/Gemalto" title="Gemalto">Gemalto</a>, which in 2010 was infiltrated by US and British spies, resulting in compromised security of cellphone calls.<sup id="cite_ref-45" class="reference"><a href="#cite_note-45"><span class="cite-bracket">&#91;</span>45<span class="cite-bracket">&#93;</span></a></sup> </p><p>It is also critical that one be able to trust that the hardware manufacturers and software developers properly implement trusted computing standards. Incorrect implementation could be hidden from users, and thus could undermine the integrity of the whole system without users being aware of the flaw.<sup id="cite_ref-schoen-promise-risk_46-0" class="reference"><a href="#cite_note-schoen-promise-risk-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Hardware_and_software_support">Hardware and software support</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=22" title="Edit section: Hardware and software support"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1251242444">.mw-parser-output .ambox{border:1px solid #a2a9b1;border-left:10px solid #36c;background-color:#fbfbfb;box-sizing:border-box}.mw-parser-output .ambox+link+.ambox,.mw-parser-output .ambox+link+style+.ambox,.mw-parser-output .ambox+link+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+style+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+link+.ambox{margin-top:-1px}html body.mediawiki .mw-parser-output .ambox.mbox-small-left{margin:4px 1em 4px 0;overflow:hidden;width:238px;border-collapse:collapse;font-size:88%;line-height:1.25em}.mw-parser-output .ambox-speedy{border-left:10px solid #b32424;background-color:#fee7e6}.mw-parser-output .ambox-delete{border-left:10px solid #b32424}.mw-parser-output .ambox-content{border-left:10px solid #f28500}.mw-parser-output .ambox-style{border-left:10px solid #fc3}.mw-parser-output .ambox-move{border-left:10px solid #9932cc}.mw-parser-output .ambox-protection{border-left:10px solid #a2a9b1}.mw-parser-output .ambox .mbox-text{border:none;padding:0.25em 0.5em;width:100%}.mw-parser-output .ambox .mbox-image{border:none;padding:2px 0 2px 0.5em;text-align:center}.mw-parser-output .ambox .mbox-imageright{border:none;padding:2px 0.5em 2px 0;text-align:center}.mw-parser-output .ambox .mbox-empty-cell{border:none;padding:0;width:1px}.mw-parser-output .ambox .mbox-image-div{width:52px}@media(min-width:720px){.mw-parser-output .ambox{margin:0 10%}}@media print{body.ns-0 .mw-parser-output .ambox{display:none!important}}</style><table class="box-Cleanup-list plainlinks metadata ambox ambox-style" role="presentation"><tbody><tr><td class="mbox-image"><div class="mbox-image-div"><span typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/f/f2/Edit-clear.svg/40px-Edit-clear.svg.png" decoding="async" width="40" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/f/f2/Edit-clear.svg/60px-Edit-clear.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/f/f2/Edit-clear.svg/80px-Edit-clear.svg.png 2x" data-file-width="48" data-file-height="48" /></span></span></div></td><td class="mbox-text"><div class="mbox-text-span">This section <b>may contain <a href="/wiki/Wikipedia:Verifiability" title="Wikipedia:Verifiability">unverified</a> or <a href="/wiki/Wikipedia:What_Wikipedia_is_not#Wikipedia_is_not_an_indiscriminate_collection_of_information" title="Wikipedia:What Wikipedia is not">indiscriminate</a> information</b> in <a href="/wiki/Wikipedia:Manual_of_Style/Embedded_lists" class="mw-redirect" title="Wikipedia:Manual of Style/Embedded lists">embedded lists</a>.<span class="hide-when-compact"> Please help <a class="external text" href="https://en.wikipedia.org/w/index.php?title=Trusted_Computing&amp;action=edit">clean up the lists</a> by removing items or incorporating them into the text of the article.</span> <span class="date-container"><i>(<span class="date">July 2014</span>)</i></span></div></td></tr></tbody></table> <p>Since 2004, most major manufacturers have shipped systems that have included <a href="/wiki/Trusted_Platform_Module" title="Trusted Platform Module">Trusted Platform Modules</a>, with associated <a href="/wiki/BIOS" title="BIOS">BIOS</a> support.<sup id="cite_ref-tpmvendors_47-0" class="reference"><a href="#cite_note-tpmvendors-47"><span class="cite-bracket">&#91;</span>47<span class="cite-bracket">&#93;</span></a></sup> In accordance with the TCG specifications, the user must enable the Trusted Platform Module before it can be used. </p><p>The <a href="/wiki/Linux_kernel" title="Linux kernel">Linux kernel</a> has included trusted computing support since version 2.6.13, and there are several projects to implement trusted computing for Linux. In January 2005, members of <a href="/wiki/Gentoo_Linux" title="Gentoo Linux">Gentoo Linux</a>'s "crypto herd" announced their intention of providing support for TC—in particular support for the Trusted Platform Module.<sup id="cite_ref-lwntc_48-0" class="reference"><a href="#cite_note-lwntc-48"><span class="cite-bracket">&#91;</span>48<span class="cite-bracket">&#93;</span></a></sup> There is also a TCG-compliant software stack for Linux named <a rel="nofollow" class="external text" href="http://trousers.sourceforge.net/">TrouSerS</a>, released under an open source license. There are several open-source projects that facilitate the use of confidential computing technology, including <a rel="nofollow" class="external text" href="https://github.com/edgelesssys/ego">EGo</a>, EdgelessDB and MarbleRun from <a href="/w/index.php?title=Edgeless_Systems&amp;action=edit&amp;redlink=1" class="new" title="Edgeless Systems (page does not exist)">Edgeless Systems</a>, as well as Enarx, which originates from security research at <a href="/wiki/Red_Hat" title="Red Hat">Red Hat</a>. </p><p>Some limited form of trusted computing can be implemented on current versions of <a href="/wiki/Microsoft_Windows" title="Microsoft Windows">Microsoft Windows</a> with third-party software. Major cloud providers such as <a href="/wiki/Microsoft_Azure" title="Microsoft Azure">Microsoft Azure</a>,<sup id="cite_ref-49" class="reference"><a href="#cite_note-49"><span class="cite-bracket">&#91;</span>49<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Amazon_Web_Services" title="Amazon Web Services">AWS</a><sup id="cite_ref-50" class="reference"><a href="#cite_note-50"><span class="cite-bracket">&#91;</span>50<span class="cite-bracket">&#93;</span></a></sup> and <a href="/wiki/Google_Cloud_Platform" title="Google Cloud Platform">Google Cloud Platform</a><sup id="cite_ref-51" class="reference"><a href="#cite_note-51"><span class="cite-bracket">&#91;</span>51<span class="cite-bracket">&#93;</span></a></sup> have virtual machines with trusted computing features available. With the <a href="/wiki/Intel" title="Intel">Intel</a> <a href="/wiki/Software_Guard_Extensions" title="Software Guard Extensions">Software Guard Extension</a> (SGX) and <a href="/wiki/Advanced_Micro_Devices" class="mw-redirect" title="Advanced Micro Devices">AMD</a> <a href="/wiki/Secure_Encrypted_Virtualization" class="mw-redirect" title="Secure Encrypted Virtualization">Secure Encrypted Virtualization</a> (SEV) processors, there is hardware available for runtime memory encryption and remote attestation features.<sup id="cite_ref-52" class="reference"><a href="#cite_note-52"><span class="cite-bracket">&#91;</span>52<span class="cite-bracket">&#93;</span></a></sup> </p><p>The Intel <a href="/wiki/Classmate_PC" title="Classmate PC">Classmate PC</a> (a competitor to the <a href="/wiki/One_Laptop_Per_Child" class="mw-redirect" title="One Laptop Per Child">One Laptop Per Child</a>) includes a Trusted Platform Module.<sup id="cite_ref-classmatepc_53-0" class="reference"><a href="#cite_note-classmatepc-53"><span class="cite-bracket">&#91;</span>53<span class="cite-bracket">&#93;</span></a></sup> </p><p><a href="/wiki/PrivateCore" title="PrivateCore">PrivateCore</a> vCage software can be used to attest <a href="/wiki/X86" title="X86">x86</a> servers with TPM chips. </p><p>Mobile T6 secure operating system simulates the TPM functionality in mobile devices using the <a href="/wiki/ARM_TrustZone" class="mw-redirect" title="ARM TrustZone">ARM TrustZone</a> technology.<sup id="cite_ref-54" class="reference"><a href="#cite_note-54"><span class="cite-bracket">&#91;</span>54<span class="cite-bracket">&#93;</span></a></sup> </p><p><a href="/wiki/Samsung" title="Samsung">Samsung</a> smartphones come equipped with <a href="/wiki/Samsung_Knox" title="Samsung Knox">Samsung Knox</a> that depend on features like Secure Boot, TIMA, <a href="/wiki/Mobile_Device_Management" class="mw-redirect" title="Mobile Device Management">MDM</a>, TrustZone and <a href="/wiki/SE_Linux" class="mw-redirect" title="SE Linux">SE Linux</a>.<sup id="cite_ref-55" class="reference"><a href="#cite_note-55"><span class="cite-bracket">&#91;</span>55<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=23" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1184024115">.mw-parser-output .div-col{margin-top:0.3em;column-width:30em}.mw-parser-output .div-col-small{font-size:90%}.mw-parser-output .div-col-rules{column-rule:1px solid #aaa}.mw-parser-output .div-col dl,.mw-parser-output .div-col ol,.mw-parser-output .div-col ul{margin-top:0}.mw-parser-output .div-col li,.mw-parser-output .div-col dd{page-break-inside:avoid;break-inside:avoid-column}</style><div class="div-col" style="column-width: 22em;"> <ul><li><a href="https://en.wiktionary.org/wiki/Transwiki:Glossary_of_legal_terms_in_technology" class="extiw" title="wikt:Transwiki:Glossary of legal terms in technology">Glossary of legal terms in technology</a></li> <li><a href="/wiki/Next-Generation_Secure_Computing_Base" title="Next-Generation Secure Computing Base">Next-Generation Secure Computing Base</a> (formerly known as Palladium)</li> <li><a href="/wiki/Trusted_Network_Connect" title="Trusted Network Connect">Trusted Network Connect</a></li> <li><a href="/wiki/Trusted_Platform_Module" title="Trusted Platform Module">Trusted Platform Module</a></li> <li><a href="/wiki/Unified_Extensible_Firmware_Interface#Secure_Boot" class="mw-redirect" title="Unified Extensible Firmware Interface">Unified Extensible Firmware Interface §&#160;Secure Boot</a></li> <li><a href="/wiki/Web_Environment_Integrity" title="Web Environment Integrity">Web Environment Integrity</a></li></ul> </div> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=24" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist reflist-columns references-column-width" style="column-width: 30em;"> <ol class="references"> <li id="cite_note-mitchell-1"><span class="mw-cite-backlink">^ <a href="#cite_ref-mitchell_1-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-mitchell_1-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite id="CITEREFChris_Mitchell2005" class="citation book cs1">Chris Mitchell (2005). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=9iriBw2AuToC"><i>Trusted Computing</i></a>. IET. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-86341-525-8" title="Special:BookSources/978-0-86341-525-8"><bdi>978-0-86341-525-8</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Trusted+Computing&amp;rft.pub=IET&amp;rft.date=2005&amp;rft.isbn=978-0-86341-525-8&amp;rft.au=Chris+Mitchell&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3D9iriBw2AuToC&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-ccc-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-ccc_2-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://confidentialcomputing.io/">"What is the Confidential Computing Consortium?"</a>. <i>Confidential Computing Consortium</i><span class="reference-accessdate">. Retrieved <span class="nowrap">20 May</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Confidential+Computing+Consortium&amp;rft.atitle=What+is+the+Confidential+Computing+Consortium%3F&amp;rft_id=https%3A%2F%2Fconfidentialcomputing.io%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-Stallman13-3"><span class="mw-cite-backlink">^ <a href="#cite_ref-Stallman13_3-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Stallman13_3-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-Stallman13_3-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFStallman" class="citation web cs1">Stallman, Richard. <a rel="nofollow" class="external text" href="https://www.gnu.org/philosophy/can-you-trust.html">"Can You Trust Your Computer?"</a>. <i>gnu.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">12 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=gnu.org&amp;rft.atitle=Can+You+Trust+Your+Computer%3F&amp;rft.aulast=Stallman&amp;rft.aufirst=Richard&amp;rft_id=https%3A%2F%2Fwww.gnu.org%2Fphilosophy%2Fcan-you-trust.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-4">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFscl-paullauria2017" class="citation web cs1">scl-paullauria (2017-01-23). <a rel="nofollow" class="external text" href="https://www.scl.org/3835-trust-me-i-m-a-computer/">"Trust me, I'm a computer"</a>. <i>Society for Computers &amp; Law</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2024-04-03</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Society+for+Computers+%26+Law&amp;rft.atitle=Trust+me%2C+I%27m+a+computer&amp;rft.date=2017-01-23&amp;rft.au=scl-paullauria&amp;rft_id=https%3A%2F%2Fwww.scl.org%2F3835-trust-me-i-m-a-computer%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-anderson2-5"><span class="mw-cite-backlink">^ <a href="#cite_ref-anderson2_5-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-anderson2_5-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFAnderson2004" class="citation book cs1">Anderson, Ross (November 15, 2004). Camp, L. Jean; Lewis, Stephen (eds.). <a rel="nofollow" class="external text" href="https://doi.org/10.1007/1-4020-8090-5_3"><i>Cryptography and Competition Policy - Issues with 'Trusted Computing', in Economics of Information Security</i></a>. Vol.&#160;12. Springer US. pp.&#160;<span class="nowrap">35–</span>52. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F1-4020-8090-5_3">10.1007/1-4020-8090-5_3</a> &#8211; via Springer Link.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Cryptography+and+Competition+Policy+-+Issues+with+%27Trusted+Computing%27%2C+in+Economics+of+Information+Security&amp;rft.pages=%3Cspan+class%3D%22nowrap%22%3E35-%3C%2Fspan%3E52&amp;rft.pub=Springer+US&amp;rft.date=2004-11-15&amp;rft_id=info%3Adoi%2F10.1007%2F1-4020-8090-5_3&amp;rft.aulast=Anderson&amp;rft.aufirst=Ross&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1007%2F1-4020-8090-5_3&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.cl.cam.ac.uk/~fms27/papers/2003-stajano-shifting.pdf">"F. Stajano, "Security for whom? The shifting security assumptions of pervasive computing", <i>Lecture notes in computer science</i>, vol. 2609, pp. 16-27, 2003"</a> <span class="cs1-format">(PDF)</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=F.+Stajano%2C+%22Security+for+whom%3F+The+shifting+security+assumptions+of+pervasive+computing%22%2C+Lecture+notes+in+computer+science%2C+vol.+2609%2C+pp.+16-27%2C+2003.&amp;rft_id=http%3A%2F%2Fwww.cl.cam.ac.uk%2F~fms27%2Fpapers%2F2003-stajano-shifting.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFRau2006" class="citation web cs1">Rau, Shane (February 2006). <a rel="nofollow" class="external text" href="https://www.trustedcomputinggroup.org/news/Industry_Data/IDC_448_Web.pdf">"The Trusted Computing Platform Emerges as Industry's First Comprehensive Approach to IT Security"</a> <span class="cs1-format">(PDF)</span>. <i>IDC Executive Brief</i>. International Data Corporation<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-02-07</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=IDC+Executive+Brief&amp;rft.atitle=The+Trusted+Computing+Platform+Emerges+as+Industry%27s+First+Comprehensive+Approach+to+IT+Security&amp;rft.date=2006-02&amp;rft.aulast=Rau&amp;rft.aufirst=Shane&amp;rft_id=https%3A%2F%2Fwww.trustedcomputinggroup.org%2Fnews%2FIndustry_Data%2FIDC_448_Web.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFOltsik2006" class="citation web cs1">Oltsik, Jon (January 2006). <a rel="nofollow" class="external text" href="https://www.trustedcomputinggroup.org/news/Industry_Data/ESG_White_Paper.pdf">"Trusted Enterprise Security: How the Trusted Computing Group (TCG) Will Advance Enterprise Security"</a> <span class="cs1-format">(PDF)</span>. <i>White Paper</i>. Enterprise Strategy Group<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-02-07</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=White+Paper&amp;rft.atitle=Trusted+Enterprise+Security%3A+How+the+Trusted+Computing+Group+%28TCG%29+Will+Advance+Enterprise+Security&amp;rft.date=2006-01&amp;rft.aulast=Oltsik&amp;rft.aufirst=Jon&amp;rft_id=https%3A%2F%2Fwww.trustedcomputinggroup.org%2Fnews%2FIndustry_Data%2FESG_White_Paper.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-9">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFKay2006" class="citation web cs1">Kay, Roger L. (2006). <a rel="nofollow" class="external text" href="https://www.trustedcomputinggroup.org/news/Industry_Data/Implementing_Trusted_Computing_RK.pdf">"How to Implement Trusted Computing: A Guide to Tighter Enterprise Security"</a> <span class="cs1-format">(PDF)</span>. Endpoint Technologies Associates<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-02-07</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=How+to+Implement+Trusted+Computing%3A+A+Guide+to+Tighter+Enterprise+Security&amp;rft.pub=Endpoint+Technologies+Associates&amp;rft.date=2006&amp;rft.aulast=Kay&amp;rft.aufirst=Roger+L.&amp;rft_id=https%3A%2F%2Fwww.trustedcomputinggroup.org%2Fnews%2FIndustry_Data%2FImplementing_Trusted_Computing_RK.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-Anderson-10"><span class="mw-cite-backlink">^ <a href="#cite_ref-Anderson_10-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Anderson_10-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-Anderson_10-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-Anderson_10-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFAnderson,_Ross2003" class="citation web cs1"><a href="/wiki/Ross_J._Anderson" title="Ross J. Anderson">Anderson, Ross</a> (August 2003). <a rel="nofollow" class="external text" href="http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html">"<span class="cs1-kern-left"></span>'Trusted Computing' Frequently Asked Questions: TC / TCG / LaGrande / NGSCB / Longhorn / Palladium / TCPA Version 1.1"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2007-02-07</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=%27Trusted+Computing%27+Frequently+Asked+Questions%3A+TC+%2F+TCG+%2F+LaGrande+%2F+NGSCB+%2F+Longhorn+%2F+Palladium+%2F+TCPA+Version+1.1&amp;rft.date=2003-08&amp;rft.au=Anderson%2C+Ross&amp;rft_id=http%3A%2F%2Fwww.cl.cam.ac.uk%2F~rja14%2Ftcpa-faq.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-11">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.dell.com/downloads/global/power/ps4q06-20070160-tcg.pdf">"Enhancing IT Security with Trusted Computing Group standards"</a> <span class="cs1-format">(PDF)</span>. <i>Dell Power Solutions</i>. November 2006. p.&#160;14<span class="reference-accessdate">. Retrieved <span class="nowrap">2006-02-07</span></span>. <q>TPMs [Trusted Platform Modules] from various semiconductor vendors are included on enterprise desktop and notebook systems from Dell and other vendors</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Dell+Power+Solutions&amp;rft.atitle=Enhancing+IT+Security+with+Trusted+Computing+Group+standards&amp;rft.pages=14&amp;rft.date=2006-11&amp;rft_id=http%3A%2F%2Fwww.dell.com%2Fdownloads%2Fglobal%2Fpower%2Fps4q06-20070160-tcg.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20070515072944/http://www.microsoft.com/whdc/system/platform/pcdesign/TPM_secure.mspx">"Trusted Platform Module Services in Windows Vista"</a>. <i>Windows Hardware Development Central</i>. <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a>. 2005-04-25. Archived from <a rel="nofollow" class="external text" href="http://www.microsoft.com/whdc/system/platform/pcdesign/TPM_secure.mspx">the original</a> on 2007-05-15<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-02-07</span></span>. <q>Windows Vista provides a set of services for applications that use TPM technologies.</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Windows+Hardware+Development+Central&amp;rft.atitle=Trusted+Platform+Module+Services+in+Windows+Vista&amp;rft.date=2005-04-25&amp;rft_id=http%3A%2F%2Fwww.microsoft.com%2Fwhdc%2Fsystem%2Fplatform%2Fpcdesign%2FTPM_secure.mspx&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-13">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFLemos2006" class="citation news cs1">Lemos, Robert (2006-07-28). <a rel="nofollow" class="external text" href="http://www.securityfocus.com/brief/265">"U.S. Army requires trusted computing"</a>. Security Focus<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-02-07</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.atitle=U.S.+Army+requires+trusted+computing&amp;rft.date=2006-07-28&amp;rft.aulast=Lemos&amp;rft.aufirst=Robert&amp;rft_id=http%3A%2F%2Fwww.securityfocus.com%2Fbrief%2F265&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-14">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.army.mil/ciog6/news/500Day2006Update.pdf">"Army CIO/G-6 500-day plan"</a> <span class="cs1-format">(PDF)</span>. <a href="/wiki/U.S._Army" class="mw-redirect" title="U.S. Army">U.S. Army</a>. October 2006<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-02-07</span></span>. <q>Strategic goal n. 3, 'deliver a joint netcentric information that enables warfighter decision superiority'<span class="cs1-kern-right"></span></q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Army+CIO%2FG-6+500-day+plan&amp;rft.pub=U.S.+Army&amp;rft.date=2006-10&amp;rft_id=http%3A%2F%2Fwww.army.mil%2Fciog6%2Fnews%2F500Day2006Update.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://iase.disa.mil/policy-guidance/dod-dar-tpm-decree07-03-07.pdf">encryption of unclassified data</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20070927060332/http://iase.disa.mil/policy-guidance/dod-dar-tpm-decree07-03-07.pdf">Archived</a> 2007-09-27 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></span> </li> <li id="cite_note-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-16">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFSafford,_David2003" class="citation web cs1"><a href="/w/index.php?title=David_Safford&amp;action=edit&amp;redlink=1" class="new" title="David Safford (page does not exist)">Safford, David</a> (2003-08-01). <a rel="nofollow" class="external text" href="http://www.linuxjournal.com/article/6633">"Take Control of TCPA"</a>. <i>Linux Journal</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2007-02-07</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Linux+Journal&amp;rft.atitle=Take+Control+of+TCPA&amp;rft.date=2003-08-01&amp;rft.au=Safford%2C+David&amp;rft_id=http%3A%2F%2Fwww.linuxjournal.com%2Farticle%2F6633&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-17">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFJohnson2016" class="citation book cs1">Johnson, Simon (2016). <a rel="nofollow" class="external text" href="https://software.intel.com/content/dam/develop/public/us/en/documents/ww10-2016-sgx-provisioning-and-attestation-final.pdf"><i>Intel Software Guard Extensions: EPID Provisioning and Attestation Services</i></a> <span class="cs1-format">(PDF)</span>. Intel<span class="reference-accessdate">. Retrieved <span class="nowrap">14 May</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Intel+Software+Guard+Extensions%3A+EPID+Provisioning+and+Attestation+Services&amp;rft.pub=Intel&amp;rft.date=2016&amp;rft.aulast=Johnson&amp;rft.aufirst=Simon&amp;rft_id=https%3A%2F%2Fsoftware.intel.com%2Fcontent%2Fdam%2Fdevelop%2Fpublic%2Fus%2Fen%2Fdocuments%2Fww10-2016-sgx-provisioning-and-attestation-final.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-18">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFShepherdMarkantonakisJaloyan2021" class="citation conference cs1">Shepherd, Carlton; Markantonakis, Konstantinos; Jaloyan, Georges-Axel (2021). <i>LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices</i>. IEEE Security and Privacy Workshops. IEEE. <a href="/wiki/ArXiv_(identifier)" class="mw-redirect" title="ArXiv (identifier)">arXiv</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://arxiv.org/abs/2102.08804">2102.08804</a></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.btitle=LIRA-V%3A+Lightweight+Remote+Attestation+for+Constrained+RISC-V+Devices&amp;rft.pub=IEEE&amp;rft.date=2021&amp;rft_id=info%3Aarxiv%2F2102.08804&amp;rft.aulast=Shepherd&amp;rft.aufirst=Carlton&amp;rft.au=Markantonakis%2C+Konstantinos&amp;rft.au=Jaloyan%2C+Georges-Axel&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-19">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFAbera2016" class="citation conference cs1">Abera, Tigist (2016). <a rel="nofollow" class="external text" href="https://dl.acm.org/doi/abs/10.1145/2976749.2978358"><i>C-FLAT: Control-Flow Attestation for Embedded Systems Software</i></a>. CCS '16. ACM. pp.&#160;<span class="nowrap">743–</span>754. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F2976749.2978358">10.1145/2976749.2978358</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781450341394" title="Special:BookSources/9781450341394"><bdi>9781450341394</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:14663076">14663076</a><span class="reference-accessdate">. Retrieved <span class="nowrap">14 May</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.btitle=C-FLAT%3A+Control-Flow+Attestation+for+Embedded+Systems+Software&amp;rft.series=CCS+%2716&amp;rft.pages=%3Cspan+class%3D%22nowrap%22%3E743-%3C%2Fspan%3E754&amp;rft.pub=ACM&amp;rft.date=2016&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A14663076%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1145%2F2976749.2978358&amp;rft.isbn=9781450341394&amp;rft.aulast=Abera&amp;rft.aufirst=Tigist&amp;rft_id=https%3A%2F%2Fdl.acm.org%2Fdoi%2Fabs%2F10.1145%2F2976749.2978358&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-JakobssonStewart13-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-JakobssonStewart13_20-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFJakobssonStewart2013" class="citation conference cs1">Jakobsson, Markus; Stewart, Guy (2013). <i>Mobile Malware: Why the Traditional AV Paradigm is Doomed, and How to Use Physics to Detect Undesirable Routines</i>. Black Hat USA.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.btitle=Mobile+Malware%3A+Why+the+Traditional+AV+Paradigm+is+Doomed%2C+and+How+to+Use+Physics+to+Detect+Undesirable+Routines&amp;rft.date=2013&amp;rft.aulast=Jakobsson&amp;rft.aufirst=Markus&amp;rft.au=Stewart%2C+Guy&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-21">^</a></b></span> <span class="reference-text">Markus Jakobsson <a rel="nofollow" class="external text" href="https://eprint.iacr.org/2018/031.pdf">Secure Remote Attestation</a> <i>Cryptology ePrint Archive.</i> Retrieved January 8, 2018.</span> </li> <li id="cite_note-bitlocker-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-bitlocker_22-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFFerguson,_Niels2006" class="citation web cs1"><a href="/wiki/Niels_Ferguson" title="Niels Ferguson">Ferguson, Niels</a> (August 2006). <a rel="nofollow" class="external text" href="http://download.microsoft.com/download/0/2/3/0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e/BitLockerCipher200608.pdf">"AES-CBC + Elephant: A Disk Encryption Algorithm for Windows Vista"</a> <span class="cs1-format">(PDF)</span>. Microsoft TechNet<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-02-07</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=AES-CBC+%2B+Elephant%3A+A+Disk+Encryption+Algorithm+for+Windows+Vista&amp;rft.pub=Microsoft+TechNet&amp;rft.date=2006-08&amp;rft.au=Ferguson%2C+Niels&amp;rft_id=http%3A%2F%2Fdownload.microsoft.com%2Fdownload%2F0%2F2%2F3%2F0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e%2FBitLockerCipher200608.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-23">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://customers.microsoft.com/en-us/story/1374464612401582154-signal-nonprofit-azure-security">"Scaling secure enclave environments with Signal and Azure confidential computing"</a>. <i>Microsoft Customers Stories</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2022-02-09</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Microsoft+Customers+Stories&amp;rft.atitle=Scaling+secure+enclave+environments+with+Signal+and+Azure+confidential+computing&amp;rft_id=https%3A%2F%2Fcustomers.microsoft.com%2Fen-us%2Fstory%2F1374464612401582154-signal-nonprofit-azure-security&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-24">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFMutzbauer2021" class="citation web cs1 cs1-prop-foreign-lang-source">Mutzbauer, Julia (2 February 2021). <a rel="nofollow" class="external text" href="https://www.healthcare-computing.de/confidential-computing-soll-patientendaten-schuetzen-a-996680/">"Confidential Computing soll Patientendaten schützen"</a>. <i>www.healthcare-computing.de</i> (in German)<span class="reference-accessdate">. Retrieved <span class="nowrap">2022-02-09</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=www.healthcare-computing.de&amp;rft.atitle=Confidential+Computing+soll+Patientendaten+sch%C3%BCtzen&amp;rft.date=2021-02-02&amp;rft.aulast=Mutzbauer&amp;rft.aufirst=Julia&amp;rft_id=https%3A%2F%2Fwww.healthcare-computing.de%2Fconfidential-computing-soll-patientendaten-schuetzen-a-996680%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-25">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFBin_Xiao2007" class="citation book cs1">Bin Xiao (2007). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=cUhpq98Zb8AC&amp;pg=PA124"><i>Autonomic and Trusted Computing: 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings</i></a>. Springer Science &amp; Business Media. p.&#160;124. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-3-540-73546-5" title="Special:BookSources/978-3-540-73546-5"><bdi>978-3-540-73546-5</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Autonomic+and+Trusted+Computing%3A+4th+International+Conference%2C+ATC+2007%2C+Hong+Kong%2C+China%2C+July+11-13%2C+2007%2C+Proceedings&amp;rft.pages=124&amp;rft.pub=Springer+Science+%26+Business+Media&amp;rft.date=2007&amp;rft.isbn=978-3-540-73546-5&amp;rft.au=Bin+Xiao&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DcUhpq98Zb8AC%26pg%3DPA124&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFMao,_Wenbo_Jin,_Hai_and_Martin,_Andrew2005" class="citation web cs1">Mao, Wenbo Jin, Hai and Martin, Andrew (2005-06-07). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20060822043633/http://www.hpl.hp.com/personal/Wenbo_Mao/research/tcgridsec.pdf">"Innovations for Grid Security From Trusted Computing"</a> <span class="cs1-format">(PDF)</span>. Archived from <a rel="nofollow" class="external text" href="http://www.hpl.hp.com/personal/Wenbo_Mao/research/tcgridsec.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 2006-08-22<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-02-07</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Innovations+for+Grid+Security+From+Trusted+Computing&amp;rft.date=2005-06-07&amp;rft.au=Mao%2C+Wenbo+Jin%2C+Hai+and+Martin%2C+Andrew&amp;rft_id=http%3A%2F%2Fwww.hpl.hp.com%2Fpersonal%2FWenbo_Mao%2Fresearch%2Ftcgridsec.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: CS1 maint: multiple names: authors list (<a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">link</a>)</span></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFMarson2006" class="citation news cs1">Marson, Ingrid (2006-01-27). <a rel="nofollow" class="external text" href="https://www.zdnet.com/article/trusted-computing-comes-under-attack/">"Trusted Computing comes under attack"</a>. <i>ZDNet</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2021-09-12</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=ZDNet&amp;rft.atitle=Trusted+Computing+comes+under+attack&amp;rft.date=2006-01-27&amp;rft.aulast=Marson&amp;rft.aufirst=Ingrid&amp;rft_id=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Ftrusted-computing-comes-under-attack%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-Schneier-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-Schneier_28-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFSchneier,_Bruce2002" class="citation news cs1"><a href="/wiki/Bruce_Schneier" title="Bruce Schneier">Schneier, Bruce</a> (2002-08-15). <a rel="nofollow" class="external text" href="http://www.schneier.com/crypto-gram-0208.html#1">"Palladium and the TCPA"</a>. <i>Crypto-Gram Newsletter</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2007-02-07</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Crypto-Gram+Newsletter&amp;rft.atitle=Palladium+and+the+TCPA&amp;rft.date=2002-08-15&amp;rft.au=Schneier%2C+Bruce&amp;rft_id=http%3A%2F%2Fwww.schneier.com%2Fcrypto-gram-0208.html%231&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-ms_drm-29"><span class="mw-cite-backlink">^ <a href="#cite_ref-ms_drm_29-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-ms_drm_29-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFCheng2008" class="citation web cs1">Cheng, Jacqui (2008-04-22). <a rel="nofollow" class="external text" href="https://arstechnica.com/information-technology/2008/04/drm-sucks-redux-microsoft-to-nuke-msn-music-drm-keys/">"DRM sucks redux: Microsoft to nuke MSN Music DRM keys"</a>. <i>Ars Technica</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2014-05-31</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Ars+Technica&amp;rft.atitle=DRM+sucks+redux%3A+Microsoft+to+nuke+MSN+Music+DRM+keys&amp;rft.date=2008-04-22&amp;rft.aulast=Cheng&amp;rft.aufirst=Jacqui&amp;rft_id=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2008%2F04%2Fdrm-sucks-redux-microsoft-to-nuke-msn-music-drm-keys%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-30">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.fudzilla.com/home/item/3495-yahoo-drm-servers-going-away?tmpl=component&amp;print=1">"Yahoo! DRM servers going away"</a>. Fudzilla.com. 2008-07-29<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-05-31</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Yahoo%21+DRM+servers+going+away&amp;rft.pub=Fudzilla.com&amp;rft.date=2008-07-29&amp;rft_id=http%3A%2F%2Fwww.fudzilla.com%2Fhome%2Fitem%2F3495-yahoo-drm-servers-going-away%3Ftmpl%3Dcomponent%26print%3D1&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFFisher2007" class="citation web cs1">Fisher, Ken (2007-08-13). <a rel="nofollow" class="external text" href="https://arstechnica.com/tech-policy/2007/08/google-selleth-then-taketh-away-proving-the-need-for-drm-circumvention/">"Google selleth then taketh away, proving the need for DRM circumvention"</a>. <i>Ars Technica</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2014-05-31</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Ars+Technica&amp;rft.atitle=Google+selleth+then+taketh+away%2C+proving+the+need+for+DRM+circumvention&amp;rft.date=2007-08-13&amp;rft.aulast=Fisher&amp;rft.aufirst=Ken&amp;rft_id=https%3A%2F%2Farstechnica.com%2Ftech-policy%2F2007%2F08%2Fgoogle-selleth-then-taketh-away-proving-the-need-for-drm-circumvention%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-32">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFFister2010" class="citation web cs1">Fister, Mister (26 March 2010). <a rel="nofollow" class="external text" href="http://www.shacknews.com/article/62995/ubisoft-offers-free-goodies-as">"Ubisoft Offers Free Goodies as Compensation f - Video Game News, Videos and File Downloads for PC and Console Games at"</a>. Shacknews.com<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-05-31</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Ubisoft+Offers+Free+Goodies+as+Compensation+f+-+Video+Game+News%2C+Videos+and+File+Downloads+for+PC+and+Console+Games+at&amp;rft.pub=Shacknews.com&amp;rft.date=2010-03-26&amp;rft.aulast=Fister&amp;rft.aufirst=Mister&amp;rft_id=http%3A%2F%2Fwww.shacknews.com%2Farticle%2F62995%2Fubisoft-offers-free-goodies-as&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-33">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFBangeman2007" class="citation web cs1">Bangeman, Eric (2007-11-07). <a rel="nofollow" class="external text" href="https://arstechnica.com/uncategorized/2007/11/major-league-baseballs-drm-change-strikes-out-with-fans/">"Major League Baseball's DRM change strikes out with fans"</a>. <i>Ars Technica</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2014-05-31</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Ars+Technica&amp;rft.atitle=Major+League+Baseball%27s+DRM+change+strikes+out+with+fans&amp;rft.date=2007-11-07&amp;rft.aulast=Bangeman&amp;rft.aufirst=Eric&amp;rft_id=https%3A%2F%2Farstechnica.com%2Funcategorized%2F2007%2F11%2Fmajor-league-baseballs-drm-change-strikes-out-with-fans%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-34">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFSchoen,_Seth2003" class="citation magazine cs1"><a href="/wiki/Seth_Schoen" class="mw-redirect" title="Seth Schoen">Schoen, Seth</a> (2003-12-01). <a rel="nofollow" class="external text" href="http://www.linuxjournal.com/article/7055">"Give TCPA an Owner Override"</a>. <i>Linux Journal</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2007-02-07</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Linux+Journal&amp;rft.atitle=Give+TCPA+an+Owner+Override&amp;rft.date=2003-12-01&amp;rft.au=Schoen%2C+Seth&amp;rft_id=http%3A%2F%2Fwww.linuxjournal.com%2Farticle%2F7055&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-35">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.nytimes.com/2006/08/09/technology/09aol.html?pagewanted=all&amp;_r=0">"A Face Is Exposed for AOL Searcher No. 4417749"</a>. <i>The New York Times</i>. 2006-08-09<span class="reference-accessdate">. Retrieved <span class="nowrap">2013-05-10</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+New+York+Times&amp;rft.atitle=A+Face+Is+Exposed+for+AOL+Searcher+No.+4417749&amp;rft.date=2006-08-09&amp;rft_id=https%3A%2F%2Fwww.nytimes.com%2F2006%2F08%2F09%2Ftechnology%2F09aol.html%3Fpagewanted%3Dall%26_r%3D0&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-36">^</a></b></span> <span class="reference-text">TPM version 1.2 specifications changes, 16.04.04</span> </li> <li id="cite_note-ReferenceA-37"><span class="mw-cite-backlink">^ <a href="#cite_ref-ReferenceA_37-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-ReferenceA_37-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text">TPM v1.2 specification changes, 2004</span> </li> <li id="cite_note-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-38">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://trousers.sourceforge.net/faq.html#1.7">"1.7 - I've taken ownership of my TPM under another OS..."</a> <i>TrouSerS FAQ</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2007-02-07</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=TrouSerS+FAQ&amp;rft.atitle=1.7+-+I%27ve+taken+ownership+of+my+TPM+under+another+OS...&amp;rft_id=http%3A%2F%2Ftrousers.sourceforge.net%2Ffaq.html%231.7&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-39">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFFelten2003" class="citation journal cs1">Felten, E.W. (May 2003). "Understanding trusted computing: will its benefits outweigh its drawbacks?". <i><a href="/wiki/IEEE_Security_%26_Privacy" title="IEEE Security &amp; Privacy">IEEE Security &amp; Privacy</a></i>. <b>1</b> (3): <span class="nowrap">60–</span>62. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2FMSECP.2003.1203224">10.1109/MSECP.2003.1203224</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=IEEE+Security+%26+Privacy&amp;rft.atitle=Understanding+trusted+computing%3A+will+its+benefits+outweigh+its+drawbacks%3F&amp;rft.volume=1&amp;rft.issue=3&amp;rft.pages=%3Cspan+class%3D%22nowrap%22%3E60-%3C%2Fspan%3E62&amp;rft.date=2003-05&amp;rft_id=info%3Adoi%2F10.1109%2FMSECP.2003.1203224&amp;rft.aulast=Felten&amp;rft.aufirst=E.W.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-40">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFOppligerRytz2005" class="citation journal cs1">Oppliger, R.; Rytz, R. (2005). <a rel="nofollow" class="external text" href="https://ieeexplore.ieee.org/document/1423956">"Does Trusted Computing Remedy Computer Security Problems?"</a>. <i>IEEE Security and Privacy Magazine</i>. <b>3</b> (2): <span class="nowrap">16–</span>19. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2FMSP.2005.40">10.1109/MSP.2005.40</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:688158">688158</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=IEEE+Security+and+Privacy+Magazine&amp;rft.atitle=Does+Trusted+Computing+Remedy+Computer+Security+Problems%3F&amp;rft.volume=3&amp;rft.issue=2&amp;rft.pages=%3Cspan+class%3D%22nowrap%22%3E16-%3C%2Fspan%3E19&amp;rft.date=2005&amp;rft_id=info%3Adoi%2F10.1109%2FMSP.2005.40&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A688158%23id-name%3DS2CID&amp;rft.aulast=Oppliger&amp;rft.aufirst=R.&amp;rft.au=Rytz%2C+R.&amp;rft_id=https%3A%2F%2Fieeexplore.ieee.org%2Fdocument%2F1423956&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-41">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://grouper.ieee.org/groups/1363/">"IEEE P1363: Standard Specifications For Public-Key Cryptography", Retrieved March 9, 2009.</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20141201024245/http://grouper.ieee.org/groups/1363/">Archived</a> December 1, 2014, at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></span> </li> <li id="cite_note-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-42">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFGarfinkelPfaffChowRosenblum2003" class="citation web cs1">Garfinkel, Tal; Pfaff, Ben; Chow, Jim; Rosenblum, Mendel; Boneh, Dan (October 19, 2003). <a rel="nofollow" class="external text" href="https://doi.org/10.1145/945445.945464">"Terra: a virtual machine-based platform for trusted computing"</a>. Association for Computing Machinery. pp.&#160;<span class="nowrap">193–</span>206. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F945445.945464">10.1145/945445.945464</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:156799">156799</a> &#8211; via ACM Digital Library.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Terra%3A+a+virtual+machine-based+platform+for+trusted+computing&amp;rft.pages=%3Cspan+class%3D%22nowrap%22%3E193-%3C%2Fspan%3E206&amp;rft.pub=Association+for+Computing+Machinery&amp;rft.date=2003-10-19&amp;rft_id=info%3Adoi%2F10.1145%2F945445.945464&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A156799%23id-name%3DS2CID&amp;rft.aulast=Garfinkel&amp;rft.aufirst=Tal&amp;rft.au=Pfaff%2C+Ben&amp;rft.au=Chow%2C+Jim&amp;rft.au=Rosenblum%2C+Mendel&amp;rft.au=Boneh%2C+Dan&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1145%2F945445.945464&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-43">^</a></b></span> <span class="reference-text">These are the functions of the private key in <a rel="nofollow" class="external text" href="http://www.di-mgt.com.au/rsa_alg.html">the RSA algorithm</a></span> </li> <li id="cite_note-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-44">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFSullivan2016" class="citation web cs1">Sullivan, Nick (27 December 2016). <a rel="nofollow" class="external text" href="https://www.youtube.com/watch?time_continue=1533&amp;v=0opakLwtPWk">"Deploying TLS 1.3: the great, the good and the bad (33c3)"</a>. <i>media.ccc.de</i>. YouTube<span class="reference-accessdate">. Retrieved <span class="nowrap">30 July</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=media.ccc.de&amp;rft.atitle=Deploying+TLS+1.3%3A+the+great%2C+the+good+and+the+bad+%2833c3%29&amp;rft.date=2016-12-27&amp;rft.aulast=Sullivan&amp;rft.aufirst=Nick&amp;rft_id=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Ftime_continue%3D1533%26v%3D0opakLwtPWk&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-45">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://firstlook.org/theintercept/2015/02/19/great-sim-heist">"The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle"</a>. <i>firstlook.org</i>. 2015-02-19<span class="reference-accessdate">. Retrieved <span class="nowrap">2015-02-27</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=firstlook.org&amp;rft.atitle=The+Great+SIM+Heist%3A+How+Spies+Stole+the+Keys+to+the+Encryption+Castle&amp;rft.date=2015-02-19&amp;rft_id=https%3A%2F%2Ffirstlook.org%2Ftheintercept%2F2015%2F02%2F19%2Fgreat-sim-heist&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-schoen-promise-risk-46"><span class="mw-cite-backlink"><b><a href="#cite_ref-schoen-promise-risk_46-0">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://pascal.case.unibz.it/handle/2038/871">Seth Schoen, "Trusted Computing: Promise and Risk", <i>COSPA Knowledge Base: Comparison, selection, &amp; suitability of OSS</i>, April 11th, 2006.</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20090319043100/http://pascal.case.unibz.it/handle/2038/871">Archived</a> 2009-03-19 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></span> </li> <li id="cite_note-tpmvendors-47"><span class="mw-cite-backlink"><b><a href="#cite_ref-tpmvendors_47-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFTony_McFadden2006" class="citation web cs1">Tony McFadden (March 26, 2006). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20070426034219/http://www.tonymcfadden.net/tpmvendors_arc.html">"TPM Matrix"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.tonymcfadden.net/tpmvendors_arc.html">the original</a> on April 26, 2007<span class="reference-accessdate">. Retrieved <span class="nowrap">2006-05-05</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=TPM+Matrix&amp;rft.date=2006-03-26&amp;rft.au=Tony+McFadden&amp;rft_id=http%3A%2F%2Fwww.tonymcfadden.net%2Ftpmvendors_arc.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-lwntc-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-lwntc_48-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://lwn.net/Articles/121386/">"Trusted Gentoo"</a>. <i>Gentoo Weekly Newsletter</i>. January 31, 2005<span class="reference-accessdate">. Retrieved <span class="nowrap">2006-05-05</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Gentoo+Weekly+Newsletter&amp;rft.atitle=Trusted+Gentoo&amp;rft.date=2005-01-31&amp;rft_id=https%3A%2F%2Flwn.net%2FArticles%2F121386%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-49">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://azure.microsoft.com/en-us/solutions/confidential-compute/">"Azure Confidential Computing – Protect Data-In-Use | Microsoft Azure"</a>. <i>azure.microsoft.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2022-02-09</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=azure.microsoft.com&amp;rft.atitle=Azure+Confidential+Computing+%E2%80%93+Protect+Data-In-Use+%7C+Microsoft+Azure&amp;rft_id=https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fsolutions%2Fconfidential-compute%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-50">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://docs.aws.amazon.com/enclaves/latest/user/nitro-enclave.html">"What is AWS Nitro Enclaves? - AWS"</a>. <i>docs.aws.amazon.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2022-02-09</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=docs.aws.amazon.com&amp;rft.atitle=What+is+AWS+Nitro+Enclaves%3F+-+AWS&amp;rft_id=https%3A%2F%2Fdocs.aws.amazon.com%2Fenclaves%2Flatest%2Fuser%2Fnitro-enclave.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-51">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://cloud.google.com/confidential-computing">"Confidential Computing"</a>. <i>Google Cloud</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2022-02-09</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Google+Cloud&amp;rft.atitle=Confidential+Computing&amp;rft_id=https%3A%2F%2Fcloud.google.com%2Fconfidential-computing&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-52">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.ericsson.com/en/blog/2021/7/cryptography-and-privacy-protecting-private-data">"Cryptography and privacy: protecting private data"</a>. <i>www.ericsson.com</i>. 2021-07-08<span class="reference-accessdate">. Retrieved <span class="nowrap">2022-02-09</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=www.ericsson.com&amp;rft.atitle=Cryptography+and+privacy%3A+protecting+private+data&amp;rft.date=2021-07-08&amp;rft_id=https%3A%2F%2Fwww.ericsson.com%2Fen%2Fblog%2F2021%2F7%2Fcryptography-and-privacy-protecting-private-data&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-classmatepc-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-classmatepc_53-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite id="CITEREFIntel2006" class="citation web cs1">Intel (December 6, 2006). <a rel="nofollow" class="external text" href="http://download.intel.com/intel/worldahead/pdf/classmatepc_productbrief.pdf?iid=worldahead+ac_cmpc_pdf">"Product Brief: Classmate PC"</a> <span class="cs1-format">(PDF)</span><span class="reference-accessdate">. Retrieved <span class="nowrap">2007-01-13</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Product+Brief%3A+Classmate+PC&amp;rft.date=2006-12-06&amp;rft.au=Intel&amp;rft_id=http%3A%2F%2Fdownload.intel.com%2Fintel%2Fworldahead%2Fpdf%2Fclassmatepc_productbrief.pdf%3Fiid%3Dworldahead%2Bac_cmpc_pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-54">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.trustkernel.org">"T6: TrustZone Based Trusted Kernel"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2015-01-12</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=T6%3A+TrustZone+Based+Trusted+Kernel&amp;rft_id=http%3A%2F%2Fwww.trustkernel.org&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> <li id="cite_note-55"><span class="mw-cite-backlink"><b><a href="#cite_ref-55">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222" /><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://news.samsung.com/global/editorial-protecting-your-mobile-with-samsung-knox">"Samsung Newsroom"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2018-03-07</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Samsung+Newsroom&amp;rft_id=https%3A%2F%2Fnews.samsung.com%2Fglobal%2Feditorial-protecting-your-mobile-with-samsung-knox&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Computing" class="Z3988"></span></span> </li> </ol></div> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Computing&amp;action=edit&amp;section=25" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><span class="official-website"><span class="url"><a rel="nofollow" class="external text" href="http://www.trustedcomputinggroup.org">Trusted Computing Group website</a></span></span></li></ul> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐7b4fff7949‐g6t2j Cached time: 20250326151017 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 0.455 seconds Real time usage: 0.563 seconds Preprocessor visited node count: 3239/1000000 Post‐expand include size: 92489/2097152 bytes Template argument size: 1906/2097152 bytes Highest expansion depth: 16/100 Expensive parser function count: 7/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 174164/5000000 bytes Lua time usage: 0.270/10.000 seconds Lua memory usage: 7579322/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 495.482 1 -total 53.91% 267.091 1 Template:Reflist 21.82% 108.119 34 Template:Cite_web 15.69% 77.735 4 Template:Cite_book 11.64% 57.682 1 Template:Short_description 6.32% 31.309 2 Template:Pagetype 6.11% 30.292 1 Template:Official_website 6.00% 29.709 1 Template:Rp 5.41% 26.817 1 Template:R/superscript 5.01% 24.813 1 Template:Cleanup_list --> <!-- Saved in parser cache with key enwiki:pcache:58608:|#|:idhash:canonical and timestamp 20250326151017 and revision id 1270660346. Rendering was triggered because: page-view --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://auth.wikimedia.org/loginwiki/wiki/Special:CentralAutoLogin/start?useformat=desktop&amp;type=1x1&amp;usesul3=1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Trusted_Computing&amp;oldid=1270660346">https://en.wikipedia.org/w/index.php?title=Trusted_Computing&amp;oldid=1270660346</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Cryptography" title="Category:Cryptography">Cryptography</a></li><li><a href="/wiki/Category:Copyright_law" title="Category:Copyright law">Copyright law</a></li><li><a href="/wiki/Category:Trusted_computing" title="Category:Trusted computing">Trusted computing</a></li><li><a href="/wiki/Category:Microsoft_Windows_security_technology" title="Category:Microsoft Windows security technology">Microsoft Windows security technology</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:Webarchive_template_wayback_links" title="Category:Webarchive template wayback links">Webarchive template wayback links</a></li><li><a href="/wiki/Category:CS1_German-language_sources_(de)" title="Category:CS1 German-language sources (de)">CS1 German-language sources (de)</a></li><li><a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">CS1 maint: multiple names: authors list</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_matches_Wikidata" title="Category:Short description matches Wikidata">Short description matches Wikidata</a></li><li><a href="/wiki/Category:All_Wikipedia_articles_needing_clarification" title="Category:All Wikipedia articles needing clarification">All Wikipedia articles needing clarification</a></li><li><a href="/wiki/Category:Wikipedia_articles_needing_clarification_from_March_2015" title="Category:Wikipedia articles needing clarification from March 2015">Wikipedia articles needing clarification from March 2015</a></li><li><a href="/wiki/Category:Articles_needing_cleanup_from_July_2014" title="Category:Articles needing cleanup from July 2014">Articles needing cleanup from July 2014</a></li><li><a href="/wiki/Category:All_pages_needing_cleanup" title="Category:All pages needing cleanup">All pages needing cleanup</a></li><li><a href="/wiki/Category:Wikipedia_list_cleanup_from_July_2014" title="Category:Wikipedia list cleanup from July 2014">Wikipedia list cleanup from July 2014</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 20 January 2025, at 16:30<span class="anonymous-show">&#160;(UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Trusted_Computing&amp;mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://www.wikimedia.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><picture><source media="(min-width: 500px)" srcset="/static/images/footer/wikimedia-button.svg" width="84" height="29"><img src="/static/images/footer/wikimedia.svg" width="25" height="25" alt="Wikimedia Foundation" lang="en" loading="lazy"></picture></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><picture><source media="(min-width: 500px)" srcset="/w/resources/assets/poweredby_mediawiki.svg" width="88" height="31"><img src="/w/resources/assets/mediawiki_compact.svg" alt="Powered by MediaWiki" lang="en" width="25" height="25" loading="lazy"></picture></a></li> </ul> </footer> </div> </div> </div> <div class="vector-header-container vector-sticky-header-container"> <div id="vector-sticky-header" class="vector-sticky-header"> <div class="vector-sticky-header-start"> <div class="vector-sticky-header-icon-start vector-button-flush-left vector-button-flush-right" aria-hidden="true"> <button class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-sticky-header-search-toggle" tabindex="-1" data-event-name="ui.vector-sticky-search-form.icon"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </button> </div> <div role="search" class="vector-search-box-vue vector-search-box-show-thumbnail vector-search-box"> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail"> <form action="/w/index.php" id="vector-sticky-search-form" class="cdx-search-input cdx-search-input--has-end-button"> <div class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia"> <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <div class="vector-sticky-header-context-bar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-sticky-header-toc" class="vector-dropdown mw-portlet mw-portlet-sticky-header-toc vector-sticky-header-toc vector-button-flush-left" > <input type="checkbox" id="vector-sticky-header-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-sticky-header-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-sticky-header-toc-label" for="vector-sticky-header-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-sticky-header-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div class="vector-sticky-header-context-bar-primary" aria-hidden="true" ><span class="mw-page-title-main">Trusted Computing</span></div> </div> </div> <div class="vector-sticky-header-end" aria-hidden="true"> <div class="vector-sticky-header-icons"> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-talk-sticky-header" tabindex="-1" data-event-name="talk-sticky-header"><span class="vector-icon mw-ui-icon-speechBubbles mw-ui-icon-wikimedia-speechBubbles"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-subject-sticky-header" tabindex="-1" data-event-name="subject-sticky-header"><span class="vector-icon mw-ui-icon-article mw-ui-icon-wikimedia-article"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-history-sticky-header" tabindex="-1" data-event-name="history-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-history mw-ui-icon-wikimedia-wikimedia-history"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only mw-watchlink" id="ca-watchstar-sticky-header" tabindex="-1" data-event-name="watch-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-star mw-ui-icon-wikimedia-wikimedia-star"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-edit-sticky-header" tabindex="-1" data-event-name="wikitext-edit-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-wikiText mw-ui-icon-wikimedia-wikimedia-wikiText"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-ve-edit-sticky-header" tabindex="-1" data-event-name="ve-edit-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-edit mw-ui-icon-wikimedia-wikimedia-edit"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-viewsource-sticky-header" tabindex="-1" data-event-name="ve-edit-protected-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-editLock mw-ui-icon-wikimedia-wikimedia-editLock"></span> <span></span> </a> </div> <div class="vector-sticky-header-buttons"> <button class="cdx-button cdx-button--weight-quiet mw-interlanguage-selector" id="p-lang-btn-sticky-header" tabindex="-1" data-event-name="ui.dropdown-p-lang-btn-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-language mw-ui-icon-wikimedia-wikimedia-language"></span> <span>16 languages</span> </button> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive" id="ca-addsection-sticky-header" tabindex="-1" data-event-name="addsection-sticky-header"><span class="vector-icon mw-ui-icon-speechBubbleAdd-progressive mw-ui-icon-wikimedia-speechBubbleAdd-progressive"></span> <span>Add topic</span> </a> </div> <div class="vector-sticky-header-icon-end"> <div class="vector-user-links"> </div> </div> </div> </div> </div> <div class="mw-portlet mw-portlet-dock-bottom emptyPortlet" id="p-dock-bottom"> <ul> </ul> </div> <script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-684955989f-nnw6l","wgBackendResponseTime":129,"wgPageParseReport":{"limitreport":{"cputime":"0.455","walltime":"0.563","ppvisitednodes":{"value":3239,"limit":1000000},"postexpandincludesize":{"value":92489,"limit":2097152},"templateargumentsize":{"value":1906,"limit":2097152},"expansiondepth":{"value":16,"limit":100},"expensivefunctioncount":{"value":7,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":174164,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 495.482 1 -total"," 53.91% 267.091 1 Template:Reflist"," 21.82% 108.119 34 Template:Cite_web"," 15.69% 77.735 4 Template:Cite_book"," 11.64% 57.682 1 Template:Short_description"," 6.32% 31.309 2 Template:Pagetype"," 6.11% 30.292 1 Template:Official_website"," 6.00% 29.709 1 Template:Rp"," 5.41% 26.817 1 Template:R/superscript"," 5.01% 24.813 1 Template:Cleanup_list"]},"scribunto":{"limitreport-timeusage":{"value":"0.270","limit":"10.000"},"limitreport-memusage":{"value":7579322,"limit":52428800}},"cachereport":{"origin":"mw-web.codfw.main-7b4fff7949-g6t2j","timestamp":"20250326151017","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Trusted Computing","url":"https:\/\/en.wikipedia.org\/wiki\/Trusted_Computing","sameAs":"http:\/\/www.wikidata.org\/entity\/Q966812","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q966812","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2002-06-21T08:35:27Z","dateModified":"2025-01-20T16:30:46Z","headline":"technology developed and promoted by the Trusted Computing Group"}</script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10