Trusted Computing

Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today's security problems through hardware changes to the personal computer. Changing hardware design isn't inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third-parties the power to enforce policies on users' computers against the their wishes. In other words, they pressure you into handing some control over your computer to someone else. This is a "feature" readymade for abuse by software authors who want to anticompetitively choke off rival software.

Stay in Touch

NSA Spying

EFF is leading the fight against the NSA's illegal mass surveillance program. Learn more about what the program is, how it works, and what you can do.

Follow EFF

We're answering questions about cyber spying legislation on Reddit with @Accessnow, @fightfortheftr, and @ACLU now: https://eff.org/r.k5vj

Jul 29 @ 7:41am

In five minutes, join @EFF, @Access, @fightfortheftr, and @ACLU for a Reddit AMA on the "cybersecurity" bill CISA and privacy.

Jul 29 @ 6:56am

Happening now: TPP negotiators trading away our digital rights in the backrooms of a luxury hotel in Maui. https://eff.org/r.zr7c

Jul 28 @ 6:11pm
JavaScript license information