Admittedly, the term "Trusted Computing" isn't as conspiratorial as it sounds. Within computer security circles, to "trust" a system has a long and legitimate history describing available degrees of credentials. Indeed, the Trusted Computing Group, a Who's Who list of major technology vendors from Microsoft to Intel to IBM, consciously emphasizes the security pedigree implied by their name. But don't let the name fool you. Ultimately, it isn't the machines the TCG aims to make trustworthy. It's their customers.
展开▼