What Is Trusted Computing, part 2

(Paywall-free popularization like this is what I do for a living. To support me, see the end of this post)

(this page is part of the Family Guide to Digital Freedom, 2007 edition. Please do read that introduction to know more about the Guide, especially if you mean to comment this page. Thanks)

(continues from here]

Can Trusted Computing devices be modified?

The first time they encounter TC or DRM, many people erroneously believe that, since they were so smart in cracking their satellite receiver or installing a cracked copy of some software for DVD duplication, they can safely ignore it. This time it is really different, however. TC-capable hardware is neither so common nor supported yet that it can guarantee that it will refuse to start if the whole system (both hardware and software) is not in a completely trusted state.

In a few years, however, TC devices will include some extra hardware components, which will not be possible to modify, remove or reprogram with normal tools. Those components are just the ones which will decide if, when it is turned on, the whole system is in what others, not its legitimate owner, have defined as a reliable state.

If those components are programmed before assembly in the factory, according to the wishes of big media companies or software makers, they will decide what you can do with “your” computer, home theater or DVD player. For the first time, it will be not only illegal, but also physically impossible to turn off or circumvent the scheme in any way: it won’t be possible to disconnect or control the relevant signals, as some experts do at home today, without breaking the device.

All the corresponding signal lines and connectors will be completely embedded inside the board or some sealed integrated circuits. In such a situation, even if people will still be able to find non-TC devices in the stores, they may be useless for all practical purposes, from burning DVDs to creating your own music playlists or simply running the software tools you like better. According to some analysts, new computers without TC locks may become quite a rarity, if not disappear from stores altogether, as soon as in 2010.

How can I recognize Trusted Computing, and what should I do about it?

It’s easy. Before buying any software, computer, or other device able to create or use music, text, movies or any other type of creative work, ask:

  • does it contain a TPM or any other Trusted Computing component?" (TPM stands for Trusted Platform Module, a class of TC devices)
  • if yes, can I still install any software I want on it?

If the answer to the second question is “no” or “I have no idea”, think at least twice before buying, and explain why to the clerk.

Who writes this, why, and how to help

I am Marco Fioretti, tech writer and aspiring polymath doing human-digital research and popularization.
I do it because YOUR civil rights and the quality of YOUR life depend every year more on how software is used AROUND you.

To this end, I have already shared more than a million words on this blog, without any paywall or user tracking, and am sharing the next million through a newsletter, also without any paywall.

The more direct support I get, the more I can continue to inform for free parents, teachers, decision makers, and everybody else who should know more stuff like this. You can support me with paid subscriptions to my newsletter, donations via PayPal (mfioretti@nexaima.net) or LiberaPay, or in any of the other ways listed here.THANKS for your support!