Trusted Computing
Definition
From the Wikipedia article at http://en.wikipedia.org/wiki/Trusted_computing
"Trusted Computing (commonly abbreviated TC) is a technology developed and promoted by the Trusted Computing Group (TCG). The term is taken from the field of trusted systems and has a specialized meaning. "Trusted computing" means that the computer will consistently behave in specific ways, and those behaviors will be enforced by hardware and software. Note that "trusted" does not imply any specific behavior - security and consistency are the most important attributes of trust. In this technical sense, "trusted" does not necessarily have the same definition as "trustworthy", because "trustworthiness" generally implies more than just security and consistency.
Trusted Computing is controversial. Advocates of the technology (like the International Data Corporation,[1] the Enterprise Strategy Group[2] and Endpoint Technologies Associates[3]) claim that it will make computers safer, less prone to viruses and malware, and thus more reliable from an end-user perspective. Further, they state that Trusted Computing will allow computers and servers to offer improved computer security over that which is currently available. Opponents (like the Electronic Frontier Foundation and the Free Software Foundation) believe that trust in the underlying companies is not deserved and that the technology puts too much power and control into the hands of those who design systems and software. They also believe that it potentially forces consumers to lose anonymity in their online interactions, as well as mandating technologies that many have no pressing need for. Finally, TC is seen as a possible enabler for future versions of document and copy protection - which are of value to corporate and other users in many markets and which to critics, raises concerns about undue censorship." (http://en.wikipedia.org/wiki/Trusted_computing)
Discussion
Trusted Computing as purposeful defective design for the user
"The term is intentionally misleading. It does not try to improve the security of the user, but rather wants to ensure that the user can be “trusted”. Obviously it’s not about the trust, it’s about the money. The companies that deliver content (specially multimedia, but it’s not restricted to media only) to the client want to be able to control the way it is used. For example, they want the content to be displayed on approved media only, banning all the “illegal” applications (illegal does not mean that it violates the law, but rather the agreement between the client and the company that sells the media)." (http://polishlinux.org/gnu/drm-vista-and-your-rights/)
More Information
The Wikipedia article links to many sources pro and con, at http://en.wikipedia.org/wiki/Trusted_computing
Webcast on Opposing Trusted Computing