Trusted computing: Difference between revisions
→Examples: Win 11, MS Accounts |
m Added archived reference links |
||
| Line 3: | Line 3: | ||
'''Trusted Computing''' is a technology developed by the Trusted Computing Group. It aims to restrict the workings of a computer so that it may only behave in ways allowed by the trust provider. | '''Trusted Computing''' is a technology developed by the Trusted Computing Group. It aims to restrict the workings of a computer so that it may only behave in ways allowed by the trust provider. | ||
It is a controversial technology because it can be used to restrict the freedom of the owner of the computer. For this reason it has been dubbed by free software activist Richard Stallman "Treacherous Computing"<ref>{{Cite web |title=Can You Trust Your Computer? |url=https://www.gnu.org/philosophy/can-you-trust.html |url-status=live |archive-url=https://web.archive.org/web/20250729024422/https://www.gnu.org/philosophy/can-you-trust.html |archive-date=2025-07-29}}</ref><ref>{{Cite web |title=Trust me, i'm a computer |url=https://www.scl.org/3835-trust-me-i-m-a-computer/ |url-status=live}}</ref> If not used with care it can easily result in data loss. | It is a controversial technology because it can be used to restrict the freedom of the owner of the computer. For this reason it has been dubbed by free software activist Richard Stallman "Treacherous Computing"<ref>{{Cite web |title=Can You Trust Your Computer? |url=https://www.gnu.org/philosophy/can-you-trust.html |url-status=live |archive-url=https://web.archive.org/web/20250729024422/https://www.gnu.org/philosophy/can-you-trust.html |archive-date=2025-07-29}}</ref><ref>{{Cite web |title=Trust me, i'm a computer |url=https://www.scl.org/3835-trust-me-i-m-a-computer/ |url-status=live |archive-url=https://archive.ph/WJDgl |archive-date=11 Jan 2026}}</ref> If not used with care it can easily result in data loss. | ||
==How it works== | ==How it works== | ||
| Line 32: | Line 32: | ||
Some notable examples include: | Some notable examples include: | ||
*Windows Vista, Windows 7, Windows 8 and Windows RT (They use a Trusted Platform Module to facilitate BitLocker Drive Encryption)<ref>{{Cite journal |title=A Disk Encryption Algorithm for Windows Vista |url=http://download.microsoft.com/download/0/2/3/0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e/BitLockerCipher200608.pdf |journal=[[Microsoft Corp.]]}}</ref> | *Windows Vista, Windows 7, Windows 8 and Windows RT (They use a Trusted Platform Module to facilitate BitLocker Drive Encryption)<ref>{{Cite journal |title=A Disk Encryption Algorithm for Windows Vista |url=http://download.microsoft.com/download/0/2/3/0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e/BitLockerCipher200608.pdf |journal=[[Microsoft Corp.]] |archive-url=https://web.archive.org/web/20061007171043/http://download.microsoft.com/download/0/2/3/0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e/BitLockerCipher200608.pdf |archive-date=7 Oct 2006}}</ref> | ||
*[[Signal data collection|Signal]] messenger<ref>{{Cite web |title=Scaling secure enclave environments with Signal and Azure confidential computing |url=https://customers.microsoft.com/en-us/story/1374464612401582154-signal-nonprofit-azure-security |url-status=live}}</ref> | *[[Signal data collection|Signal]] messenger<ref>{{Cite web |title=Scaling secure enclave environments with Signal and Azure confidential computing |url=https://customers.microsoft.com/en-us/story/1374464612401582154-signal-nonprofit-azure-security |url-status=live |archive-url=https://archive.ph/y9Rph |archive-date=11 Jan 2026}}</ref> | ||
*and the e-prescription service E-Rezept<ref>{{Cite web |title=Confidential Computing soll Patientendaten schützen |url=https://www.healthcare-computing.de/confidential-computing-soll-patientendaten-schuetzen-a-996680/}}</ref> | *and the e-prescription service E-Rezept<ref>{{Cite web |title=Confidential Computing soll Patientendaten schützen |url=https://www.healthcare-computing.de/confidential-computing-soll-patientendaten-schuetzen-a-996680/ |archive-url=https://archive.ph/83yEQ |archive-date=11 Jan 2026}}</ref> | ||
*[[Microsoft Windows 11]] requires TPM 2.0 module and Microsoft account for installation. | *[[Microsoft Windows 11]] requires TPM 2.0 module and Microsoft account for installation. | ||
==References== | ==References== | ||
{{reflist}} | {{reflist}} | ||
[[Category:Common terms]] | [[Category:Common terms]] | ||