Wednesday, September 8, 2010

Five reasons for adopting the Trusted Computing


Image : http://www.flickr.com


Trusted Computing is perhaps one of the most misunderstood (willfully misunderstood, to be honest about it) new technologies for information security. The misunderstanding begins with the Wikipedia on "Trusted Computing" and is composed of hundreds of articles and blogs. Of course, there are exceptions apply to the fact that it has entered into a smart, although it can be applied to open source software, who say that there are no hidden back doorsApplication. However, a similar argument was made for almost all computer systems available, so if you can get to overcome the mental block, there are five good reasons to "inspire Trustworthy Computing."

Before Trusted Computing based full disk encryption
There are a number of free (TrueCrypt is the most famous) and paid software solutions to encrypt the entire disk, but recently, before he had many attacks of the maid of Evil, in a PCAlone in a hotel room on the left is booted from an external hard drive to steal your password. But Joanna Rutkowska described Labs invisible things like Microsoft's BitLocker encryption solution can be easily extended disk, so that the user can easily see that the computer has been hacked. If this attack is not bad cleaning of great concern, Trusted Computing Group has defined the opal implements the specification, the entire hard disk hardware encryption,Remember that every service software solutions. There is no good reason for the next unit to purchase, no support for the specific Opal.

Segundo Unified Secure connection to your favorite sites
The OpenID initiative has produced a way of letting in many places with a single password to access while maintaining a central location. This is an excellent initiative, but also for greater acceptance and adoption by organizations such as banks, have higher security requirements,and adoption by users the same safety requirements must be higher Wave Systems has taken another step in protecting your passwords with a built-platform of trust, so the server can be the other end to ensure that ' user is actually the word is guaranteed compatible with the identity of the TPM, and you can be sure that access to services can be achieved by the team with the TPM installed.

Third network security
This function is aGreat for a business, perhaps more by the administrator when the employee, but. CNC, Trusted Network Connect has identified a number of protocols on IF-MAP protocol interface to access metadata, subscribers to your state consultation, and other networking devices allowed them on the network of discussion. Although designed for corporate networks, is considered in the domestic sphere, for example, someone might be hacking into the network and toasterclose enough benefits for the end toaster roasts, the rest of your home.

Back to DRM
Oh, look, I told the ghost of text, send the Trusted Computing DRM opponents attack with indignation. However, the fact of the matter is that the media companies want to provide content through the network, but do not want to do what you want, what makes the money spent a lot of content. Trusted Computing and Trusted Platform ModuleIts network connected set-top box, and you have a system that has the potential to meet the "better than free," a mantra, as was done for iTunes Music.

Cell phone safety fifth
Currently, some mobile phones like the BlackBerry is an excellent security, as the assertion that the iPhone, and fewer still have little or nothing. However defined, the Trusted Computing Module Mobile confidence, security chip (or software mode of trust and implement safelysame function) adds that the same functions of the TPM, plus a few extras tailored to the music world. Now the mobile operator to your ringtones Rock-solid DRM (yes, the eyes may also comment on these things!) Yes, but more important is the mobile banking can be safe if not more, PC banking. The National Security Agency, the U.S. is said that in the present, looking for who knows what ...

So there are five good reasons Trustworthy Computing exciting.In some previous cases, can not be your friend, but "Trusted Computing" is certainly not your enemy unless of course you can be a pirate! People who work in trusted computing standards have talent and some children if one of them, even the guys I know Microsoft are around you and that fit their products. In fact, the TPM specification is tilted backwards for privacy at the expense of functionality!

No comments:

Post a Comment