Compatibility, competition, and control in trusted computing environments

  • Authors:
  • Seth Schoen

  • Affiliations:
  • Electronic Frontier Foundation, 454 Shotwell Street, San Francisco, CA 94110 USA

  • Venue:
  • Information Security Tech. Report
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Trusted computing (TC) technologies deployed in the PC platform could shift the balance of power in some on-line interactions away from computer end-users and consumers of information goods and services. This effect occurs when remote attestation features make previously indistinguishable software configurations distinguishable; service and information goods providers can then discriminate against disfavored client software. Network externalities mean that even those who don't opt-in to TC use may still be harmed by widespread TC deployment. These effects might be ''defanged'' by some technical changes to TC designs.