“
There’s still a problem here: we need to know that the device itself hasn’t been compromised at some point, that the machine’s own “identity,” going back to its origins as a pile of unassembled parts in the factory, can be trusted. It’s a hard nut to crack. Device manufacturers use the phrase “trusted computing” to describe their efforts to resolve it. It’s a concept that chipmakers AMD and Intel Corp. have worked on in concert with IBM, Microsoft, Cisco, and others within a consortium known as the Trusted Computing Group. As it is currently designed, trusted computing is intended to confirm that a computer will act as intended—for example, that it will communicate the very string of text that the user types in, and nothing else, when certain keystrokes are hit—that is, that it has not been compromised by malicious code.
”
”
Michael J. Casey (The Truth Machine: The Blockchain and the Future of Everything)