Chapter 14. The Trusted Platform in Front of You

This chapter illustrates how a person can have greater confidence that the platform in front of them has not been subverted, and how to use that platform for signing and processing particularly sensitive data. It starts by showing how a user can determine whether or not to trust the platform. TPs have mechanisms that provide evidence about their software state, so that user can decide whether to trust the platform. Unfortunately, the mechanisms are inherently complex, and cannot be directly used by people—they require cryptographic operations and complex comparisons. As a consequence, a human user always needs to use a computing engine to challenge a TP (as described in Chapter 12), even when ...

Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.