本文对应《A Practical Guide to TPM 2.0 — Using the Trusted Platform Module in the New Age of Security》的第1章第1节。
1.1 Why a TPM? —— 为什么需要TPM?
In the 1990s, it became increasingly obvious to people in the computer industry that
the Internet was going to change the way personal computers were connected, and
that commerce was going to move toward this environment. This immediately led to a
realization that there was a need for increased security in personal computers. When
PCs were first designed, little thought was given to their security, so the hardware did not
support it. Additionally, software was designed without any thought to security—ease of
use was the main driving force in software development.
The computer engineers who go