Trusted Computing: Difference between revisions

Added sources and references.
Tags: Mobile edit Mobile web edit Visual edit
added tonewarning - this currently reads quite swivel-eyed, and while references are present, they are not linked in with article text in any way
 
(7 intermediate revisions by 3 users not shown)
Line 1: Line 1:
Trusted Computing , sometimes called "Treacherous Computing" sis the name of the initiative of a joint effort of multiple companies to add hardware level restrictions and restrict user ownership and freedom on multiple various types of
{{ToneWarning}}


Computers and devices, including , but not limited to: Computers, desktop and notebook, single board computers, PDAs, smartphones, tablets, media players, game consoles, digital video recoord3rs, home theater systems, smart televisions, streaming boxes, pretty much anything with a printed circuit board and a digital purpose.
Trusted Computing, sometimes called "Treacherous Computing" is the name of the initiative of a joint effort of multiple companies to add hardware level restrictions and restrict user ownership and freedom on multiple various types of computers and devices, including, but not limited to: Computers, desktops and notebooks, single board computers, PDAs, smartphones, tablets, media players, game consoles, digital video recorders, home theater systems, smart televisions, streaming boxes, pretty much anything with a printed circuit board and a digital purpose.


==How it works==
==How it works==
Line 13: Line 13:




==les==
==Examples==
Some notable examples include:
Some notable examples include:


Line 22: Line 22:
Almost every smartphone and tablet both Android  
Almost every smartphone and tablet both Android  


Amazon Kindle and kindke fire
Amazon Kindle and Kindle Fire


Apple Ipod
Apple iPod


Microsoft zune
Microsoft Zune


Sony Playstation line of consoles
Sony PlayStation line of consoles


Microsoft XbOx line if consoles
Microsoft Xbox line if consoles


Intel Magement Engine
Intel Management Engine


AMD equivelent
AMD Platform Security Processor


Secureboot
Secureboot
Line 46: Line 46:
Windows 11
Windows 11


Macos
MacOS




Line 57: Line 57:
https://www.fsf.org/news/treacherous.html
https://www.fsf.org/news/treacherous.html


==https://www.fsf.org/blogs/community/drm-carroll<nowiki/>==
 
https://www.gnu.org/philosophy/can-you-trust.html
 
 
https://www.slashgear.com/windows-11-tpm-2-0-could-affect-other-software-as-well-05689649/
 
https://www.fsf.org/blogs/community/drm-carroll
 
<nowiki>;</nowiki>
 
https://en.m.wikipedia.org/wiki/Trusted_Computing
https://en.m.wikipedia.org/wiki/Trusted_Computing