Stanford CIS

tcblog

Blog

New articles

In the latest Indicare monitor, several articles on policy-related aspects of TC have been published. See here (on TC and DRM), here (on OpenTC),  here  (on DRM…

Blog

New Best Practices Version

In December 2005, the TCG published an updated version of its Best Practices document. It is available here.…

Blog

TC talk @ Harvard [Update]

On March 7, I gave talk on trusted computing at the Berkman Center at Harvard Law School. An audio recording is available here.  It is also available on iTunes.…

Blog

Vivek Haldar's TC Blog

Vivek Haldar has recently started a blog with some interesting postings on P2P and TC, Seth's owner override proposal, and my questions concerning semantic…

Blog

TC article

For those of you who understand German, I have written an article (in German) on legal and policy problems of trusted computing. It is available online here. It…

Blog

The paternalistic paternalism of TC

Seth Schoen has posted a very interesting blog entry about some trends in the trusted computing research community according to which educating users about comp…

Blog

Property-based Sealing

Although much of the policy discussion has focused on the problems created by TCG's remote attestation feature, people like Ross Anderson and, to some exten…

Blog

The Family of TC Blogs

In the near future, I'll add a category to this page listing all weblogs that deal with trusted computing. In the mean time, here is a list of the weblogs I…

Blog

Virtualizing the TPM

Increasingly, people are working on virtual, software-based implementations of the TPM (just to give one example). In addition, companies are thinking about imp…

Blog

Apple and the TPM

As recent news (Wired and CNet) indicates, Apple is using an Infineon TPM chip in order to bind its forthcoming x86-based version of Mac OS to particular hardwa…