1 00:00:13,000 --> 00:00:15,000 Trust 2 00:00:16,000 --> 00:00:19,000 Trust is the personal believe in correctness of something. 3 00:00:20,000 --> 00:00:25,000 It is the deep conviction of truth and rightness and cannot be enforced 4 00:00:27,000 --> 00:00:29,000 If you gain someones trust 5 00:00:30,000 --> 00:00:32,000 you have established an interpersonal relationship 6 00:00:32,000 --> 00:00:37,000 based on communication, shared values and experiences. 7 00:00:37,000 --> 00:00:41,000 Trust always depends on mutuality. 8 00:00:43,000 --> 00:00:46,000 This process has been reshaped by the computer industry 9 00:00:49,000 --> 00:00:51,000 Now a microchip does that task for you 10 00:00:52,000 --> 00:00:55,000 The industry calls it "trusted computing" 11 00:00:58,000 --> 00:01:00,000 This chip will be in 12 00:01:00,000 --> 00:01:01,000 Computers 13 00:01:02,000 --> 00:01:02,800 Notebooks 14 00:01:02,800 --> 00:01:03,300 Servers 15 00:01:03,300 --> 00:01:04,000 PDAs 16 00:01:04,000 --> 00:01:04,000 Cell phones 17 00:01:04,000 --> 00:01:05,000 Game units 18 00:01:05,000 --> 00:01:05,400 DVD players 19 00:01:05,400 --> 00:01:05,800 Set-top boxes 20 00:01:05,800 --> 00:01:06,200 Watches 21 00:01:06,200 --> 00:01:06,600 Mixers 22 00:01:06,600 --> 00:01:07,000 Steam irons 23 00:01:07,000 --> 00:01:07,400 Fridges 24 00:01:07,800 --> 00:01:08,200 Fire-extinguishers 25 00:01:08,200 --> 00:01:08,600 Grandfather's earplugs 26 00:01:08,600 --> 00:01:09,000 Toilets 27 00:01:09,000 --> 00:01:09,600 Dogs 28 00:01:09,600 --> 00:01:10,000 ??? 29 00:01:10,000 --> 00:01:10,400 Boxes 30 00:01:11,000 --> 00:01:14,000 And it will be your devices, too. 31 00:01:15,500 --> 00:01:19,000 What has trusted computing to do with trust? 32 00:01:21,000 --> 00:01:22,500 Let us show you. 33 00:01:22,500 --> 00:01:31,000 In a trusted computing environment the major goal is to protect us from potential threats. 34 00:01:32,000 --> 00:01:37,000 The original trusted computing idea is designed to let you decide 35 00:01:37,000 --> 00:01:40,000 what to consider as threat and what to consider trustworthy. 36 00:01:41,000 --> 00:01:44,000 You can control by your own personal conviction. 37 00:01:46,000 --> 00:01:50,000 Trusted computing sounds great - doesn't it? 38 00:01:52,000 --> 00:01:59,000 The industry's interpretation of the trusted computing idea looks quite similar aiming at the same: 39 00:02:00,000 --> 00:02:03,000 To fight threats and make computing trustworthier. 40 00:02:04,000 --> 00:02:07,500 The main difference is that you can not decide by your own 41 00:02:07,500 --> 00:02:10,000 what is trustworthy and what is not. 42 00:02:11,000 --> 00:02:13,000 Because they already decided for you. 43 00:02:14,000 --> 00:02:18,000 And they already decided not to trust you. 44 00:02:21,000 --> 00:02:23,500 So if they don't trust you 45 00:02:24,000 --> 00:02:27,000 why should you trust them? 46 00:02:33,000 --> 00:02:35,000 Trust is the personal believe... 47 00:02:36,000 --> 00:02:37,500 Trust always depends on mutuality. 48 00:02:39,000 --> 00:02:42,000 Trusted computing sounds great 49 00:02:43,000 --> 00:02:49,000 is it? 50 00:02:54,000 --> 00:02:59,000 Learn more: www.againsttcpa.com 51 00:03:03,500 --> 00:03:06,000 Directed, animated and produced by: Benjamin Stephan, Lutz Vogel 52 00:03:07,000 --> 00:03:09,000 Voiceover: Christian Hoening - Thanks! 53 00:03:10,500 --> 00:03:12,500 Sound: Simon Mahler, www.fotone.net 54 00:03:14,000 --> 00:03:15,500 This movie is licensed under a creative commons license 55 00:03:17,000 --> 00:03:19,500 Download, info and contact: www.pixelamusement.com www.lafkon.net 56 00:03:21,000 --> 00:03:25,000 Lafkon publishing