What is trusted computing? Why doesn’t the industry trust me? Why do they want control about my computer/pda/cellphone/other device? Why can’t I decide by myself, who is thrustworthy? There’s a movie available at [LAFKONs page on Trusted Computing](http://www.lafkon.net/tc/). Though it is quite short it makes YOU ask these questions. Go watch it.
Be the first to start the conversation!