This document discusses trusted computing and the trusted platform module (TPM). It provides background on TPM, explaining that TPM is a hardware-based security chip that provides cryptographic and security functions. This allows increased trust that a computing system will behave as expected. The document covers how TPM works, providing sealed storage for keys and on-chip crypto. It also discusses the potential for abuse of features like attestation by software vendors. While TPM increases security, there are concerns about user privacy and control over their own devices.