The spread of ‘trust’ is unstoppable… The Trusted Computing Group is a movement from the most formidable software and hardware manufacturers in the world to develop an architecture that would improve the underlying security of computers. The Trusted Computing Group aims to make sure a computer is working to a specified expectation of behaviour. This would apply to the problem of malicious code, for example. Malicious code makes a computer behave differently to the expected normality so cannot be hidden. The measurement of such changes in behaviour is done by a Trusted Platform Module, which is implicity trusted and is the core of the trusted computing architecture. Sound too good to be true? Some commentators believe these security benefits could come at a price, which may include digital rights management or privacy compromise. Stephen Mason believes that the implications of Trusted Computing are profound and there are serious concerns, which must be addressed before the technology become ubiquitous, which it is well on the way to becoming. It is axiomatic that computers are not to be trusted. As a tool, they are capable of improving our lives. However, beneficial as computers may be, they are also unsafe. The dangers are obvious, although what you consider is a threat will depend on your perspective. Application software vendors do not always receive licence fees for all of their software running on every computer. Users have to buy anti-virus solutions to protect their computers from attack by malicious code. Owners of secrets have to take precautions to prevent the unauthorized use or theft of sensitive data. Musicians, actresses and authors want to be properly remunerated for their creativity. The range of problems associated with the misuse of computers is manifest, and once a computer is linked into a network, the risks increase considerably.