As there are many terms to vast projects like Elastos and Cyber Republic, we’ve decided to build a growing glossary of terms that can help you understand better what various (tech) terms mean and the role they play.

Trusted computing is run by various mechanisms that can be installed on a software and/or hardware level.

These mechanisms allow for utmost trust within a computer operating system through a certain set of rules and guidelines that are hardcoded in a trusted computing component to safeguard security and privacy.

“Trusted computing…generates trust by thoroughly securing the technology (hardware, software, or both) to guarantee system integrity and to make it very hard to breach from a technical standpoint.” – Lex Pablo

The trusted computing method can be broken down into six key concepts:

Endorsement key: Randomly created public and private key on the chip the manufacturer created that cannot be changed. The key is used to authorize the execution of secure transactions.

Secure input and output: Combat threats from spyware that seizes the content of a display.

Memory curtaining / protected execution: Providing an isolated environment of specific and sensitive areas of memory that the OS doesn’t have access to.

Sealed storage: The protection of private data and information. Data can only be accessed through a combination of software and hardware.

Remote attestation: Recognizes unauthorized changes to software through the process of generating fully encrypted certificates for every application on the operating system.

Trusted third party: An entity that acts as an intermediary between the computer and user or between a user and other users. This process ensures the users are communicating through a trusted party.