What is a trustworthy computer technology?

Trusted computing centers around using computer hardware to protect parts of the computer from attack or unintentional damage. The trustworthy computing group, an international team that usually consists of computer hardware manufacturers, writes proposals and specifications for this technology. The basic idea of ​​technology is the insulation of the computer area that prevents undamaged software from accessing information or running a system. Trusted computer technology came across a strong opposition, mainly because of its ability to circumvent users and privacy.

Technology uses a chip that is placed on a computer. It has two keys- one is known only to the computer and the other is known only to trusted computational manufacturers of hardware and software company. The chip takes over certain areas of the computer, mostly memory and storage, and uses the keys to verify the correct activity in the system.

technology attempts to ensure computers in a context way. Theoretically by allowing an externalSources to control basic computer operations, some disturbing or harmful elements are completely stopped. Programs that should not be accessible to computer areas are prevented. This control is used to prevent an unintentional user error and can stop many types of malicious software or malware, attacks.

Some weapons of government and private companies use trustworthy computer techniques. The United States Army and the Ministry of Defense Trust computing modules installed on each new machine. Microsoft and Dell computer and software companies are dabbling with technology, but planning to increase their involvement over time. Advanced Micro Devices (AMD) and Intel Corporation plan to use trusted computing modules in each of their upcoming processor chips.

trusted computer technology has generated many controversie surrounding its methods andpolicy. Many groups of software users and personal freedoms are strongly against this technology. Several open software companies are also against the methods used to determine what is and is not trusted software.

One of the strongest areas of opposition centers to manage digital rights (DRM). Without a trustworthy computer, a person can store his files on a disk and will run on the second computer as well on another computer and files. With the module, the files would not necessarily run, because their internal keys would not match those in the new location. In addition, if you wanted to upgrade your computer hardware or open a file in another program, you may not be able to. According to opponents, this lack of mobility and options on the market is therefore illegal.

DRM problems are also expanding into access. If you buy a digital item, a trusted module computer technician can limit how, when and how many times you have access to a file in a given period. IfThe module will allow you to play the song on Monday only at 8 pm, the file will not be launched another time. This applies to items without a specifically built -in DRM. If the same song had no DRM at all, the module still doesn't have to play it because of its unsecured nature.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?