Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Trusted Computing
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Hardware and software support== {{cleanup list|section|date=July 2014}} Since 2004, most major manufacturers have shipped systems that have included [[Trusted Platform Module]]s, with associated [[BIOS]] support.<ref name="tpmvendors">{{cite web | url = http://www.tonymcfadden.net/tpmvendors_arc.html | title = TPM Matrix | author = Tony McFadden | date = March 26, 2006 | access-date = 2006-05-05 | url-status = dead | archive-url = https://web.archive.org/web/20070426034219/http://www.tonymcfadden.net/tpmvendors_arc.html | archive-date = April 26, 2007 }}</ref> In accordance with the TCG specifications, the user must enable the Trusted Platform Module before it can be used. The [[Linux kernel]] has included trusted computing support since version 2.6.13, and there are several projects to implement trusted computing for Linux. In January 2005, members of [[Gentoo Linux]]'s "crypto herd" announced their intention of providing support for TCβin particular support for the Trusted Platform Module.<ref name="lwntc">{{cite web | url=https://lwn.net/Articles/121386/ | title = Trusted Gentoo | date = January 31, 2005 | access-date=2006-05-05 | work = Gentoo Weekly Newsletter }}</ref> There is also a TCG-compliant software stack for Linux named [http://trousers.sourceforge.net/ TrouSerS], released under an open source license. There are several open-source projects that facilitate the use of confidential computing technology, including [https://github.com/edgelesssys/ego EGo], EdgelessDB and MarbleRun from [[Edgeless Systems]], as well as Enarx, which originates from security research at [[Red Hat]]. Some limited form of trusted computing can be implemented on current versions of [[Microsoft Windows]] with third-party software. Major cloud providers such as [[Microsoft Azure]],<ref>{{Cite web |title=Azure Confidential Computing β Protect Data-In-Use {{!}} Microsoft Azure |url=https://azure.microsoft.com/en-us/solutions/confidential-compute/ |access-date=2022-02-09 |website=azure.microsoft.com |language=en}}</ref> [[Amazon Web Services|AWS]]<ref>{{Cite web |title=What is AWS Nitro Enclaves? - AWS |url=https://docs.aws.amazon.com/enclaves/latest/user/nitro-enclave.html |access-date=2022-02-09 |website=docs.aws.amazon.com}}</ref> and [[Google Cloud Platform]]<ref>{{Cite web |title=Confidential Computing |url=https://cloud.google.com/confidential-computing |access-date=2022-02-09 |website=Google Cloud |language=en}}</ref> have virtual machines with trusted computing features available. With the [[Intel]] [[Software Guard Extensions|Software Guard Extension]] (SGX) and [[Advanced Micro Devices|AMD]] [[Secure Encrypted Virtualization]] (SEV) processors, there is hardware available for runtime memory encryption and remote attestation features.<ref>{{Cite web|date=2021-07-08|title=Cryptography and privacy: protecting private data|url=https://www.ericsson.com/en/blog/2021/7/cryptography-and-privacy-protecting-private-data|access-date=2022-02-09|website=www.ericsson.com|language=en}}</ref> The Intel [[Classmate PC]] (a competitor to the [[One Laptop Per Child]]) includes a Trusted Platform Module.<ref name="classmatepc">{{cite web | url=http://download.intel.com/intel/worldahead/pdf/classmatepc_productbrief.pdf?iid=worldahead+ac_cmpc_pdf | title = Product Brief: Classmate PC | author = Intel | date = December 6, 2006 | access-date = 2007-01-13 }}</ref> [[PrivateCore]] vCage software can be used to attest [[x86]] servers with TPM chips. Mobile T6 secure operating system simulates the TPM functionality in mobile devices using the [[ARM TrustZone]] technology.<ref>{{cite web|url=http://www.trustkernel.org|title=T6: TrustZone Based Trusted Kernel|access-date=2015-01-12}}</ref> [[Samsung]] smartphones come equipped with [[Samsung Knox]] that depend on features like Secure Boot, TIMA, [[Mobile Device Management|MDM]], TrustZone and [[SE Linux]].<ref>{{cite web|url=https://news.samsung.com/global/editorial-protecting-your-mobile-with-samsung-knox|title=Samsung Newsroom|access-date=2018-03-07}}</ref>
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
Trusted Computing
(section)
Add topic