Trusted Computing: Difference between revisions
Added sources and references. Tags: Mobile edit Mobile web edit Visual edit |
mNo edit summary Tags: Mobile edit Mobile web edit Visual edit |
||
(5 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
Trusted Computing , sometimes called "Treacherous Computing" | Trusted Computing, sometimes called "Treacherous Computing" is the name of the initiative of a joint effort of multiple companies to add hardware level restrictions and restrict user ownership and freedom on multiple various types of computers and devices, including, but not limited to: Computers, desktops and notebooks, single board computers, PDAs, smartphones, tablets, media players, game consoles, digital video recorders, home theater systems, smart televisions, streaming boxes, pretty much anything with a printed circuit board and a digital purpose. | ||
==How it works== | ==How it works== | ||
Line 13: | Line 11: | ||
== | ==Examples== | ||
Some notable examples include: | Some notable examples include: | ||
Line 57: | Line 55: | ||
https://www.fsf.org/news/treacherous.html | https://www.fsf.org/news/treacherous.html | ||
https://www.gnu.org/philosophy/can-you-trust.html | |||
https://www.slashgear.com/windows-11-tpm-2-0-could-affect-other-software-as-well-05689649/ | |||
https://www.fsf.org/blogs/community/drm-carroll | |||
<nowiki>;</nowiki> | |||
https://en.m.wikipedia.org/wiki/Trusted_Computing | https://en.m.wikipedia.org/wiki/Trusted_Computing | ||