Trusted Computing

Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today's security problems through hardware changes to the personal computer. Changing hardware design isn't inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third-parties the power to enforce policies on users' computers against the their wishes. In other words, they pressure you into handing some control over your computer to someone else. This is a "feature" readymade for abuse by software authors who want to anticompetitively choke off rival software.

Stay in Touch

NSA Spying

EFF is leading the fight against the NSA's illegal mass surveillance program. Learn more about what the program is, how it works, and what you can do.

Follow EFF

EFF strongly objects to the US proposed Wassenaar implementation. We're drafting comments and you should too! https://eff.org/r.sg5g

May 28 @ 12:21pm

There's just 3 days, 9 hours, and 45 minutes until Section 215 of the Patriot Act sunsets. Time to call Congress: https://eff.org/r.88yz 

May 28 @ 11:14am

There are just 3 days, 9 hours, and 52 minutes until Section 215 of the Patriot Act sunsets. Make sure it happens: https://eff.org/r.88yz

May 28 @ 11:07am
JavaScript license information