Category Archives: laptop product reivew

When you create a project, Binder prompts you to synchronize it.

When you create a project, Binder prompts you to synchronize it. Answering “Yes” to the prompt synchronizes the case; that is, it makes all transcripts available offline so that if someone leaves the office he or she can take the … Continue reading

Posted in laptop, laptop product reivew | Leave a comment

These different ways to automate document production vary in what they can

These different ways to automate document production vary in what they can produce, their cost, their level of complexity and customizability, and the level of interactivity or intelligence they use in creating documents. The choice you make will depend on … Continue reading

Posted in laptop product reivew, monitar | Leave a comment

Closing remarks

  For the reasons discussed above, the greatest strength of trusted computing is in providing components which can be used to give assurances to desktop users about the integrity of their operating environments. This may be achieved through providing extra … Continue reading

Posted in laptop product reivew, monitar | Leave a comment

This system, in the style of SETI@home, distributed hundreds

This system, in the style of SETI@home, distributed hundreds of thousands of climate modelling tasks to users around the world. It was under a duty to protect the climate model code, but also, of course, needed to offer reassurance that … Continue reading

Posted in laptop product reivew, monitar | Leave a comment

Impact of Trusted Computing

The approaches described above have the potential to alter radically the design both of end-user desktop systems, and distributed applications. It is certainly novel to have a strong guarantee of what software is running — locally and remotely — coupled … Continue reading

Posted in laptop, laptop product reivew | Leave a comment

The architecture allows for two separate suites of functionality: a ‘remote owner’ MTM (MTRM)

The architecture allows for two separate suites of functionality: a ‘remote owner’ MTM (MTRM) and a ‘local owner’ MTM (MTLM). The latter is intended to offer TPM-like capabilities to user-level applications, and so is virtually indistinguishable from the current TPM … Continue reading

Posted in laptop, laptop product reivew | Leave a comment

The process of remote attestation is based upon the root of trust for reporting

The process of remote attestation is based upon the root of trust for reporting: this is implemented as the Endorsement Key (EK). The credentials accompanying the EK are the proof for a third party that the platform they are interacting … Continue reading

Posted in laptop product reivew, monitar | Leave a comment

This is described as ‘sealing’ data to a particular platform state.

This is described as ‘sealing’ data to a particular platform state. We would, of course, expect the TPM to be managing the secret key used for the decryption, ensuring that it is not available for arbitrary cryptographic operations. Both of … Continue reading

Posted in laptop, laptop product reivew | Leave a comment

We have used the term ‘trust’ informally above.

We have used the term ‘trust’ informally above. This notion is, of course, the subject of stacks of literature: in computing, in sociology and psychology, and so on. Indeed, the word is sufficiently over-loaded that Gollman (2004) was able to … Continue reading

Posted in laptop product reivew, monitar | Leave a comment

The same challenges apply to any system we interact with across the network,

The same challenges apply to any system we interact with across the network, with the added complexity that because we cannot see or touch the servers involved, we have to take a whole lot more on trust. We generally have … Continue reading

Posted in laptop, laptop product reivew | Leave a comment