Trusted Computing

About computers and trust.

About

There is a short animated video (3 minutes and 30 seconds) about trust and computers.

It is important to listen to it.

Transcript

Trust

Trust is the personal belief in correctness of something;

It is the deep conviction of truth and rightness and cannot be enforced.

If you gain someone's trust you have established an interpersonal relationship based on communication shared values and experiences.

Trust always depends on mutuality.

This process has been reshaped by the computer industry.

Now, a microchip does that task for you.

The industry calls it Trusted Computing.

This chip will be in computers notebooks servers PDAs cell phones game units DVD players and it will be in your devices too.

What has trusted computing to do with trust?

Let us show you.

In a Trusted Computing environment the major goal is to protect us from potential threats;

The original trusted computing idea is designed to let you decide what to consider as threat and what to consider trustworthy;

You can control by your own personal conviction.

Trusted Computing sounds great doesn't it.

The industry's interpretation of the Trusted Computing idea looks quite similar, aiming at the same, to fight threats and make computing trustworthy;

The main difference is that you cannot decide by your own what is trustworthy and what is not, because they already decided for you, and they already decided not to trust you.

So, if they don't trust you, why should you trust them?

Thanks for reading!

Downloads

🌊 BitTorrent (High quality)

=> ed2k://|file|TrustedComputing_LAFKON_HIGH.mov|50834053|68D9B8032FCF0CA5A0515B65998F8376|p=60FB8D2997A845CF59958C82F64D6DDF:C840976FCAE7E135822D2EC199C3FF07:370091DFCD81FE24CE9DB5E1E6B94A52:4458F2A40E2994BE223FB307F93E1EF3:B686A21D7E1A6A80E6C79377F812B81F:D6ECC86D9CE60973AD0189E5D5255075|h=RNVE65FIMBKLMFFKROVLP2ATPAUBBUO3|/|sources,84.155.16.23:4662|/ 🫏 eDonkey2000 (High quality)

=> ed2k://|file|TrustedComputing_LAFKON_MID.mov|25857760|2234D7B42350727F07B8B161C2E8D4B4|p=1BD783A917A7620B7A18709898512C55:23898CC3088602C6E5A2411B987E3FB3:4EA88EDA1FA4CD82836AD96EAE3559EB|h=X36H2QQA4OB53C2IJQMGD5N4OGMDZHLK|/|sources,84.155.16.23:4662|/ 🫏 eDonkey2000 (Medium quality)

=> ed2k://|file|trustedcomputing_lafkon_low.mov|6893165|de95739a5d295ccae0a65ea37d9fde30|h=sibqxzrfa2azyr7spmh24ti5tvbtzi6h|/|sources,84.155.16.23:4662|/ 🫏 eDonkey2000 (Low quality)

Resources

[LAFKON] - A movie about Trusted Computing
Trusted Computing FAQ TC / TCG / LaGrande / NGSCB / Longhorn / Palladium

Related

Mobile computer industry and Open Source