Trusted Computing: Difference between revisions

Added sources and references.
Tags: Mobile edit Mobile web edit Visual edit
mNo edit summary
Tags: Mobile edit Mobile web edit Visual edit
 
(5 intermediate revisions by 2 users not shown)
Line 1: Line 1:
Trusted Computing , sometimes called "Treacherous Computing" sis the name of the initiative of a joint effort of multiple companies to add hardware level restrictions and restrict user ownership and freedom on multiple various types of
Trusted Computing, sometimes called "Treacherous Computing" is the name of the initiative of a joint effort of multiple companies to add hardware level restrictions and restrict user ownership and freedom on multiple various types of computers and devices, including, but not limited to: Computers, desktops and notebooks, single board computers, PDAs, smartphones, tablets, media players, game consoles, digital video recorders, home theater systems, smart televisions, streaming boxes, pretty much anything with a printed circuit board and a digital purpose.
 
Computers and devices, including , but not limited to: Computers, desktop and notebook, single board computers, PDAs, smartphones, tablets, media players, game consoles, digital video recoord3rs, home theater systems, smart televisions, streaming boxes, pretty much anything with a printed circuit board and a digital purpose.


==How it works==
==How it works==
Line 13: Line 11:




==les==
==Examples==
Some notable examples include:
Some notable examples include:


Line 57: Line 55:
https://www.fsf.org/news/treacherous.html
https://www.fsf.org/news/treacherous.html


==https://www.fsf.org/blogs/community/drm-carroll<nowiki/>==
 
https://www.gnu.org/philosophy/can-you-trust.html
 
 
https://www.slashgear.com/windows-11-tpm-2-0-could-affect-other-software-as-well-05689649/
 
https://www.fsf.org/blogs/community/drm-carroll
 
<nowiki>;</nowiki>
 
https://en.m.wikipedia.org/wiki/Trusted_Computing
https://en.m.wikipedia.org/wiki/Trusted_Computing