Stanford CIS

tcblog

Blog

TCG 1.2 announced

On November 5, the Trusted Computing Group announced the release of TCG TPM 1.2 at the RSA conference in Amsterdam. From a legal and policy perspective, TCG 1.2…

Blog

Owner Override [updated Oct. 13]

Many observers have pointed out that TC architectures might be used by application, service and content providers to define which client applications to interop…

Blog

Urgent need to document the TC ecology

As Ed Felten recently wrote in IEEE Security & Privacy May/June 2003, 60, 61: "In fact, the direct effects of TC are relatively harmless. It is the ind…

Blog

Intel LaGrande Policy Draft

Intel has posted a draft of its LaGrande Technology Policy on Owner/User Choice and Control, and welcomes comments until the end of this year. While I like many…

Blog

Intro

I am trying to collect some information about trusted computing architectures such as TCG and Microsoft's NGSCB. I am particularly interested in their legal…