TC was developed and specialized by the Trusted Computing Group (TCG), formerly known as the Trusted Computing Platform Alliance (TCPA). TCG was formed in 1999 to develop a verification specification for PC behavior, components and devices.
TC is controversial because manufacturers cannot prevent absolute user alteration of source code, hardware, or hardware settings.
Trusted PC is also known as Trusted Computing (TC).
TC advocates - such as the International Data Corporation, enterprise strategy group and endpoint technologies associates - assert that TC can be realized by building an open-source stack of trusted modules, where only security chips are guarded from modification. Advocates claim that this creates PC systems that are safer, more reliable and less susceptible to viruses and malware.
Although proponents tout improved PC security, TC opponents argue that this specialized platform will only strengthen digital rights management (DRM) policies. TC opponents refer to TC as treacherous computing.
TC involves compliance with six key concepts:
- Endorsement key
- Secure input/output (I/O)
- Memory curtaining/protected execution
- Sealed storage
- Remote attestation
- Trusted third party
0 Comments