Article ID Journal Published Year Pages File Type
10342537 Information Security Technical Report 2005 15 Pages PDF
Abstract
Trusted computing (TC) technologies deployed in the PC platform could shift the balance of power in some on-line interactions away from computer end-users and consumers of information goods and services. This effect occurs when remote attestation features make previously indistinguishable software configurations distinguishable; service and information goods providers can then discriminate against disfavored client software. Network externalities mean that even those who don't opt-in to TC use may still be harmed by widespread TC deployment. These effects might be “defanged” by some technical changes to TC designs.
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
,