Center on January 24, 2004.
So-called trusted computing technologies have raised a tremendous amount of controversy. They have been condemned as Orwellian and promoted as a means
of stopping the ravages of computer viruses and limiting the power of intruders.
The class will explain in depth how trusted computing technologies actually work, drawing from published and proposed source code and specifications.
Students will gain the ability both to interact and interoperate with trusted computing technologies and to understand the privacy and business
threats that trusted computing poses.