Trusted computing: Difference between revisions
m Added archived reference links |
Re-archived 3 citation(s) from archive.today to web.archive.org using CRWCitationBot |
||
| Line 3: | Line 3: | ||
'''Trusted Computing''' is a technology developed by the Trusted Computing Group. It aims to restrict the workings of a computer so that it may only behave in ways allowed by the trust provider. | '''Trusted Computing''' is a technology developed by the Trusted Computing Group. It aims to restrict the workings of a computer so that it may only behave in ways allowed by the trust provider. | ||
It is a controversial technology because it can be used to restrict the freedom of the owner of the computer. For this reason it has been dubbed by free software activist Richard Stallman "Treacherous Computing"<ref>{{Cite web |title=Can You Trust Your Computer? |url=https://www.gnu.org/philosophy/can-you-trust.html |url-status=live |archive-url=https://web.archive.org/web/20250729024422/https://www.gnu.org/philosophy/can-you-trust.html |archive-date=2025-07-29}}</ref><ref>{{Cite web |title=Trust me, i'm a computer |url=https://www.scl.org/3835-trust-me-i-m-a-computer/ |url-status=live |archive-url=https://archive. | It is a controversial technology because it can be used to restrict the freedom of the owner of the computer. For this reason it has been dubbed by free software activist Richard Stallman "Treacherous Computing"<ref>{{Cite web |title=Can You Trust Your Computer? |url=https://www.gnu.org/philosophy/can-you-trust.html |url-status=live |archive-url=https://web.archive.org/web/20250729024422/https://www.gnu.org/philosophy/can-you-trust.html |archive-date=2025-07-29}}</ref><ref>{{Cite web |title=Trust me, i'm a computer |url=https://www.scl.org/3835-trust-me-i-m-a-computer/ |url-status=live |archive-url=https://web.archive.org/web/20260222231700/https://www.scl.org/3835-trust-me-i-m-a-computer/ |archive-date=22 Feb 2026}}</ref> If not used with care it can easily result in data loss. | ||
==How it works== | ==How it works== | ||
| Line 33: | Line 33: | ||
*Windows Vista, Windows 7, Windows 8 and Windows RT (They use a Trusted Platform Module to facilitate BitLocker Drive Encryption)<ref>{{Cite journal |title=A Disk Encryption Algorithm for Windows Vista |url=http://download.microsoft.com/download/0/2/3/0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e/BitLockerCipher200608.pdf |journal=[[Microsoft Corp.]] |archive-url=https://web.archive.org/web/20061007171043/http://download.microsoft.com/download/0/2/3/0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e/BitLockerCipher200608.pdf |archive-date=7 Oct 2006}}</ref> | *Windows Vista, Windows 7, Windows 8 and Windows RT (They use a Trusted Platform Module to facilitate BitLocker Drive Encryption)<ref>{{Cite journal |title=A Disk Encryption Algorithm for Windows Vista |url=http://download.microsoft.com/download/0/2/3/0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e/BitLockerCipher200608.pdf |journal=[[Microsoft Corp.]] |archive-url=https://web.archive.org/web/20061007171043/http://download.microsoft.com/download/0/2/3/0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e/BitLockerCipher200608.pdf |archive-date=7 Oct 2006}}</ref> | ||
*[[Signal data collection|Signal]] messenger<ref>{{Cite web |title=Scaling secure enclave environments with Signal and Azure confidential computing |url=https://customers.microsoft.com/en-us/story/1374464612401582154-signal-nonprofit-azure-security |url-status=live |archive-url=https:// | *[[Signal data collection|Signal]] messenger<ref>{{Cite web |title=Scaling secure enclave environments with Signal and Azure confidential computing |url=https://customers.microsoft.com/en-us/story/1374464612401582154-signal-nonprofit-azure-security |url-status=live |archive-url=http://web.archive.org/web/20241111200600/https://customers.microsoft.com/en-us/story/1374464612401582154-signal-nonprofit-azure-security |archive-date=11 Nov 2024}}</ref> | ||
*and the e-prescription service E-Rezept<ref>{{Cite web |title=Confidential Computing soll Patientendaten schützen |url=https://www.healthcare-computing.de/confidential-computing-soll-patientendaten-schuetzen-a-996680/ |archive-url=https:// | *and the e-prescription service E-Rezept<ref>{{Cite web |title=Confidential Computing soll Patientendaten schützen |url=https://www.healthcare-computing.de/confidential-computing-soll-patientendaten-schuetzen-a-996680/ |archive-url=http://web.archive.org/web/20220926124209/https://www.healthcare-computing.de/confidential-computing-soll-patientendaten-schuetzen-a-996680/ |archive-date=26 Sep 2022}}</ref> | ||
*[[Microsoft Windows 11]] requires TPM 2.0 module and Microsoft account for installation. | *[[Microsoft Windows 11]] requires TPM 2.0 module and Microsoft account for installation. | ||