TPM, part 2

Daniel Schroeder sec at dschroeder.info
Sun Jul 1 10:32:58 EDT 2007


Peter Gutmann wrote:
> "Leichter, Jerry" <leichter_jerrold at emc.com> writes:
>
>   
>> All your data belong to us.  From Computerworld.
>>
>> Trusted Computing Group turns attention to storage
>>     
>
> I think it's more like "There must be some business case for these things
> somewhere, surely.  Let's try a breadth-first search...".
>
> "David G. Koontz" <david_koontz at xtra.co.nz> writes:
>
>   
>> Even conservatively there is in the tens of millions of these devices sold,
>> although we have no indication how many were actually used for Trusted
>> Computing purposes.
>>     
>
> I have a friend who implemented a basic trusted-boot mechanism for a student
> project, so we have evidence of at least one use of a TPM for TC, and I know
> some folks at IBM Research were playing with one a few years ago, so that's at
> least two users so far.  Anyone else?
>
>   
There is a project at the University of Applied Science in Hanover 
working on "Trusted Network Computing".

http://tnc.inform.fh-hannover.de/wiki/index.php/Main_Page


Daniel

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list