TPM, part 2
Daniel Schroeder
sec at dschroeder.info
Sun Jul 1 10:32:58 EDT 2007
Peter Gutmann wrote:
> "Leichter, Jerry" <leichter_jerrold at emc.com> writes:
>
>
>> All your data belong to us. From Computerworld.
>>
>> Trusted Computing Group turns attention to storage
>>
>
> I think it's more like "There must be some business case for these things
> somewhere, surely. Let's try a breadth-first search...".
>
> "David G. Koontz" <david_koontz at xtra.co.nz> writes:
>
>
>> Even conservatively there is in the tens of millions of these devices sold,
>> although we have no indication how many were actually used for Trusted
>> Computing purposes.
>>
>
> I have a friend who implemented a basic trusted-boot mechanism for a student
> project, so we have evidence of at least one use of a TPM for TC, and I know
> some folks at IBM Research were playing with one a few years ago, so that's at
> least two users so far. Anyone else?
>
>
There is a project at the University of Applied Science in Hanover
working on "Trusted Network Computing".
http://tnc.inform.fh-hannover.de/wiki/index.php/Main_Page
Daniel
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list