New articles
In the latest Indicare monitor, several articles on policy-related aspects of TC have been published. See here (on TC and DRM), here (on OpenTC), here (on DRM…
In the latest Indicare monitor, several articles on policy-related aspects of TC have been published. See here (on TC and DRM), here (on OpenTC), here (on DRM…
In December 2005, the TCG published an updated version of its Best Practices document. It is available here.…
On March 7, I gave talk on trusted computing at the Berkman Center at Harvard Law School. An audio recording is available here. It is also available on iTunes.…
Vivek Haldar has recently started a blog with some interesting postings on P2P and TC, Seth's owner override proposal, and my questions concerning semantic…
For those of you who understand German, I have written an article (in German) on legal and policy problems of trusted computing. It is available online here. It…
Seth Schoen has posted a very interesting blog entry about some trends in the trusted computing research community according to which educating users about comp…
Bruce Schneier has written an interesting and widely-circulated blog entry about TCG's Best Practices document. He is wondering why the document applies to…
Although much of the policy discussion has focused on the problems created by TCG's remote attestation feature, people like Ross Anderson and, to some exten…
Over the last year or so, computer science research on code attestation has increased considerably. I have blogged about current research to overcome the policy…
In the near future, I'll add a category to this page listing all weblogs that deal with trusted computing. In the mean time, here is a list of the weblogs I…
Increasingly, people are working on virtual, software-based implementations of the TPM (just to give one example). In addition, companies are thinking about imp…
As recent news (Wired and CNet) indicates, Apple is using an Infineon TPM chip in order to bind its forthcoming x86-based version of Mac OS to particular hardwa…