Trusted Computing: Difference between revisions

mNo edit summary
Tags: Mobile edit Mobile web edit Visual edit
m Changes some typos and minor formatting
Line 1: Line 1:
Trusted Computing , sometimes called "Treacherous Computing" sis the name of the initiative of a joint effort of multiple companies to add hardware level restrictions and restrict user ownership and freedom on multiple various types of
Trusted Computing, sometimes called "Treacherous Computing" is the name of the initiative of a joint effort of multiple companies to add hardware level restrictions and restrict user ownership and freedom on multiple various types of computers and devices, including, but not limited to: Computers, desktops and notebooks, single board computers, PDAs, smartphones, tablets, media players, game consoles, digital video recorders, home theater systems, smart televisions, streaming boxes, pretty much anything with a printed circuit board and a digital purpose.
 
Computers and devices, including , but not limited to: Computers, desktop and notebook, single board computers, PDAs, smartphones, tablets, media players, game consoles, digital video recoord3rs, home theater systems, smart televisions, streaming boxes, pretty much anything with a printed circuit board and a digital purpose.


==How it works==
==How it works==