Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10342537 | Information Security Technical Report | 2005 | 15 Pages |
Abstract
Trusted computing (TC) technologies deployed in the PC platform could shift the balance of power in some on-line interactions away from computer end-users and consumers of information goods and services. This effect occurs when remote attestation features make previously indistinguishable software configurations distinguishable; service and information goods providers can then discriminate against disfavored client software. Network externalities mean that even those who don't opt-in to TC use may still be harmed by widespread TC deployment. These effects might be “defanged” by some technical changes to TC designs.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Seth Schoen,