Trusted Computing: Difference between revisions
Added sources and references. Tags: Mobile edit Mobile web edit Visual edit |
added tonewarning - this currently reads quite swivel-eyed, and while references are present, they are not linked in with article text in any way |
||
(7 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
{{ToneWarning}} | |||
Trusted Computing, sometimes called "Treacherous Computing" is the name of the initiative of a joint effort of multiple companies to add hardware level restrictions and restrict user ownership and freedom on multiple various types of computers and devices, including, but not limited to: Computers, desktops and notebooks, single board computers, PDAs, smartphones, tablets, media players, game consoles, digital video recorders, home theater systems, smart televisions, streaming boxes, pretty much anything with a printed circuit board and a digital purpose. | |||
==How it works== | ==How it works== | ||
Line 13: | Line 13: | ||
== | ==Examples== | ||
Some notable examples include: | Some notable examples include: | ||
Line 22: | Line 22: | ||
Almost every smartphone and tablet both Android | Almost every smartphone and tablet both Android | ||
Amazon Kindle and | Amazon Kindle and Kindle Fire | ||
Apple | Apple iPod | ||
Microsoft | Microsoft Zune | ||
Sony | Sony PlayStation line of consoles | ||
Microsoft | Microsoft Xbox line if consoles | ||
Intel | Intel Management Engine | ||
AMD | AMD Platform Security Processor | ||
Secureboot | Secureboot | ||
Line 46: | Line 46: | ||
Windows 11 | Windows 11 | ||
MacOS | |||
Line 57: | Line 57: | ||
https://www.fsf.org/news/treacherous.html | https://www.fsf.org/news/treacherous.html | ||
https://www.gnu.org/philosophy/can-you-trust.html | |||
https://www.slashgear.com/windows-11-tpm-2-0-could-affect-other-software-as-well-05689649/ | |||
https://www.fsf.org/blogs/community/drm-carroll | |||
<nowiki>;</nowiki> | |||
https://en.m.wikipedia.org/wiki/Trusted_Computing | https://en.m.wikipedia.org/wiki/Trusted_Computing | ||
Latest revision as of 22:21, 6 May 2025
❗Article Status Notice: Unacceptable Tone/Word Usage
This article needs additional work to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues. Specifically it uses wording throughout that is non-compliant with the Editorial guidelines of this wiki.
How You Can Help:
If this is a non-Theme article:
- Persuasive language should not be used in the Wiki's voice. Avoid loaded words, or the causing of unnecessary offense, wherever possible.
- No direct attacks on named individuals or companies. Malice may be attributed to bad and proven offenders, but only through the use of quotation and citation - never in the Wiki's voice.
If this is a Theme article:
- Where argumentation is used make sure it is clear and direct but not inflammatory. Avoid strong language, or causing unnecessary offense.
- No direct attacks on named individuals or companies. Malice may be attributed to bad and proven offenders, in a formal and calm manner.
This notice will be removed once sufficient documentation has been added to establish the systemic nature of these issues. Once you believe the article is ready to have its notice removed, visit the Discord (join here) and post to the #appeals
channel.
Trusted Computing, sometimes called "Treacherous Computing" is the name of the initiative of a joint effort of multiple companies to add hardware level restrictions and restrict user ownership and freedom on multiple various types of computers and devices, including, but not limited to: Computers, desktops and notebooks, single board computers, PDAs, smartphones, tablets, media players, game consoles, digital video recorders, home theater systems, smart televisions, streaming boxes, pretty much anything with a printed circuit board and a digital purpose.
How it works[edit | edit source]
Trusted Computing usually consists of both hardware and software restrictions, From a locked down restricted operating system to a locked down restricted bios and or firmware to hardware level backdoors in the CPU, SOC, motherboard, to a physical chip known as a "Trusted Platform Module", "TPM" for short. A TPM enabled machine will RESTRICT and will NOT allow certain user actions.
Why it is a problem[edit | edit source]
One problem is user ownership and freedom. Depending on the device, various user actions may be restricted and or completely prohibited. Installing and using third party and or alternative software from operating systems to applications may be restricted and or completely impossible! Modifying certain system settings may be restricted and or completely impossible! Also user loss if ownership over data including files and documents is an issue!
Another problem is privacy and security. Because of hardware and software level backdoor, an affected system is vulnerable to remote tampering, sabotage and attack, both when the machine is on and off! Data including files and documents can be edited, encrypted, deleted without the user's consent nor knowledge! System settings can be edited without the user's consent nor knowledge!
Examples[edit | edit source]
Some notable examples include:
Palladium
Trusted Computing Module TPM and TPM 2.0
Almost every smartphone and tablet both Android
Amazon Kindle and Kindle Fire
Apple iPod
Microsoft Zune
Sony PlayStation line of consoles
Microsoft Xbox line if consoles
Intel Management Engine
AMD Platform Security Processor
Secureboot
Pluton
Walled gardens
Windows 10
Windows 11
MacOS
Tesla Motors Automobiles
John Deere Tractors
References[edit | edit source]
https://www.fsf.org/campaigns/drm.html
https://www.fsf.org/news/treacherous.html
https://www.gnu.org/philosophy/can-you-trust.html
https://www.slashgear.com/windows-11-tpm-2-0-could-affect-other-software-as-well-05689649/
https://www.fsf.org/blogs/community/drm-carroll
;
https://en.m.wikipedia.org/wiki/Trusted_Computing
https://www.defectivebydesign.org/what_is_drm
https://www.fsf.org/news/treacherous.html
https://www.fsf.org/campaigns/campaigns/secure-boot-vs-restricted-boo
https://www.fsf.org/campaigns/campaigns/secure-boot-vs-restricted-boot
https://www.fsf.org/blogs/sysadmin/the-management-engine-an-attack-on-computer-users-freedom
https://www.gnu.org/philosophy/android-and-users-freedom.html
https://www.gnu.org/philosophy/loyal-computers.html
https://www.gnu.org/proprietary/proprietary.html
https://www.fsf.org/campaigns/fight-to-repair
https://www.gnu.org/philosophy/tivoization.html
https://foundation.mozilla.org/en/privacynotincluded/
https://wiki.archlinux.org/title/Trusted_Platform_Module
https://wiki.gentoo.org/wiki/Trusted_Platform_Module
http://www.trustedcomputinggroup.org/
https://www.intel.com/content/www/us/en/support/articles/000008927/software/chipset-software.html