Editing TPM

Jump to: navigation, search

Warning: You are not logged in.

Your IP address will be recorded in this page's edit history.
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 7: Line 7:
 
The Trusted Computing Group (TCG) is an alliance of Microsoft, Intel, IBM, HP and AMD which promotes a standard for a "more secure"  (i.e. under their control) PC. Their definition of security is controversial; machines built according to their specification will be more trustworthy from the point of view of software vendors and the content industry, but will be less trustworthy from the point of view of their owners. In effect, the TCG specification will transfer the ultimate control of your PC from you to whoever wrote the software it happens to be running. (Yes, even more so than at present.) For another opinion, read IBM's [http://www.research.ibm.com/gsal/tcpa/tcpa_rebuttal.pdf TCPA Misinformation Rebuttal].
 
The Trusted Computing Group (TCG) is an alliance of Microsoft, Intel, IBM, HP and AMD which promotes a standard for a "more secure"  (i.e. under their control) PC. Their definition of security is controversial; machines built according to their specification will be more trustworthy from the point of view of software vendors and the content industry, but will be less trustworthy from the point of view of their owners. In effect, the TCG specification will transfer the ultimate control of your PC from you to whoever wrote the software it happens to be running. (Yes, even more so than at present.) For another opinion, read IBM's [http://www.research.ibm.com/gsal/tcpa/tcpa_rebuttal.pdf TCPA Misinformation Rebuttal].
  
The TCG project is known by a number of names. `Trusted computing' was the original one, and is still used by IBM, while Microsoft calls it `trustworthy computing' and the Free Software Foundation calls it `treacherous computing'. Other names you may see include TCPA (TCG's name before it incorporated), Palladium (the old Microsoft name for the version due to ship in 2006) and NGSCB (the new Microsoft name). Intel has just started calling it `safer computing'. Many observers believe that this confusion is deliberate - the promoters want to deflect attention from what TC actually does. '''Discuss TPM in our [http://www.osx86project.org/forum/index.php?showforum=2 Forum]'''       <DEAD LINK
+
The TCG project is known by a number of names. `Trusted computing' was the original one, and is still used by IBM, while Microsoft calls it `trustworthy computing' and the Free Software Foundation calls it `treacherous computing'. Other names you may see include TCPA (TCG's name before it incorporated), Palladium (the old Microsoft name for the version due to ship in 2006) and NGSCB (the new Microsoft name). Intel has just started calling it `safer computing'. Many observers believe that this confusion is deliberate - the promoters want to deflect attention from what TC actually does. '''Discuss TPM in our [http://www.osx86project.org/forum/index.php?showforum=2 Forum]'''
  
 
While most users do not do their own programming, for many hackers who built the industry and old time programmers, this is the latest wave of &quot;bite the hand that fed you&quot; restrictions on programming one's own machine.  For this group, the logical endpoint of being pushed off their own machines, which can only be centrally programmed,  is problematic.
 
While most users do not do their own programming, for many hackers who built the industry and old time programmers, this is the latest wave of &quot;bite the hand that fed you&quot; restrictions on programming one's own machine.  For this group, the logical endpoint of being pushed off their own machines, which can only be centrally programmed,  is problematic.

Please note that all contributions to OSx86 may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see OSx86:Copyrights for details). Do not submit copyrighted work without permission!

Cancel | Editing help (opens in new window)

Templates used on this page:

Powered by MediaWiki © 2021 OSx86 Project  |   InsanelyMac  |   Forum  |   OSx86 Wiki   |   Privacy policy   |   About OSx86   |   Disclaimers