iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



L2luZmluaXRvLz9hY3Rpb249ZWRpdCZzZWN0aW9uPTI3Jng9aHR0cCUzQSUyRiUyRmVuLndpa2lwZWRpYS5vcmclMkZ3JTJGaW5kZXgucGhwJTNGdGl0bGUlM0RUcnVzdGVkX1BsYXRmb3JtX01vZHVsZQ==. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

1. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

2. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

3. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

4. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

5. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

6. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

7. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

8. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

9. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

10. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

11. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

12. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

13. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

14. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

15. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

16. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

17. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

18. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

19. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

20. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

21. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

22. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

23. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

24. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

25. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

26. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

27. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

28. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

29. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

30. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

31. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

32. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

33. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

34. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

35. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

36. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

37. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

38. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

39. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

40. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

41. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

42. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

43. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

44. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

45. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

46. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

47. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

48. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

49. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

50. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

51. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

52. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

53. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

54. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

55. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

56. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

57. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

58. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

59. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

60. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

61. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

62. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

63. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

64. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

65. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

66. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

67. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

68. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

69. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

70. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

71. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

72. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

73. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

74. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

75. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

76. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

77. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

78. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

79. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

80. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

81. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

82. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

83. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

84. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

85. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

86. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

87. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

88. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

89. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

90. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

91. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

92. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

93. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

94. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

95. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

96. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

97. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

98. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

99. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

100. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

101. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

102. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

103. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

104. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

105. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

106. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

107. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

108. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

109. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

110. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

111. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

112. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

113. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

114. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

115. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

116. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

117. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

118. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

119. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

120. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

121. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

122. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

123. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

124. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

125. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

126. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

127. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

128. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

129. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

130. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

131. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

132. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

133. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

134. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

135. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

136. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

137. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

138. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

139. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

140. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

141. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

142. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

143. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

144. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

145. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

146. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

147. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

148. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

149. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

150. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

151. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

152. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

153. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

154. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

155. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

156. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

157. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

158. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

159. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

160. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

161. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

162. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

163. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

164. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

165. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

166. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

167. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

168. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

169. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

170. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

171. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

172. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

173. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

174. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

175. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

176. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

177. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

178. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

179. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

180. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

181. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

182. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

183. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

184. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

185. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

186. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

187. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

188. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

189. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

190. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

191. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

192. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

193. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

194. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

195. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

196. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

197. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

198. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

199. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

200. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

201. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

202. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

203. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

204. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

205. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

206. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

207. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

208. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

209. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

210. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

211. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

212. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

213. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

214. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

215. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

216. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

217. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

218. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

219. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

220. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

221. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

222. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

223. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

224. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

225. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

226. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

227. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

228. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

229. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

230. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

231. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

232. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

233. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

234. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

235. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

236. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

237. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

238. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

239. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

240. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

241. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

242. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

243. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

244. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

245. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

246. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

247. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

248. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

249. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

250. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

251. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

252. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

253. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

254. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

255. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

256. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

257. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

258. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

259. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

260. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

261. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

262. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

263. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

264. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

265. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

266. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

267. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

268. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

269. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

270. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

271. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

272. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

273. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

274. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

275. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

276. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

277. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

278. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

279. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

280. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

281. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

282. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

283. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

284. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

285. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

286. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

287. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

288. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

289. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

290. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

291. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

292. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

293. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

294. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

295. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

296. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

297. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

298. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

299. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

300. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

301. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

302. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

303. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

304. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

305. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

306. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

307. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

308. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

309. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

310. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

311. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

312. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

313. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

314. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

315. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

316. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

317. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

318. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

319. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

320. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

321. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

322. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

323. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

324. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

325. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

326. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

327. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

328. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

329. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

330. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

331. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

332. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

333. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

334. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

335. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

336. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

337. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

338. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

339. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

340. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

341. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

342. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

343. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

344. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

345. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

346. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

347. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

348. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

349. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

350. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

351. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

352. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

353. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

354. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

355. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

356. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

357. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

358. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

359. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

360. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

361. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

362. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

363. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

364. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

365. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

366. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

367. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

368. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

369. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

370. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

371. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

372. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

373. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

374. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

375. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

376. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

377. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

378. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

379. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

380. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

381. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

382. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

383. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

384. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

385. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

386. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

387. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

388. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

389. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

390. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

391. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

392. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

393. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

394. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

395. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

396. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

397. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

398. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

399. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

400. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

401. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

402. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

403. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

404. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

405. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

406. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

407. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

408. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

409. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

410. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

411. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

412. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

413. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

414. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

415. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

416. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

417. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

418. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

419. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

420. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

421. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

422. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

423. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

424. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

425. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

426. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

427. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

428. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

429. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

430. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

431. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

432. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

433. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

434. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

435. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

436. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

437. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

438. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

439. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

440. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

441. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

442. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

443. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

444. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

445. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

446. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

447. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

448. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

449. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

450. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

451. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

452. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

453. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

454. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

455. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

456. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

457. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

458. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

459. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

460. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

461. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

462. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

463. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

464. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

465. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

466. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

467. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

468. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

469. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

470. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

471. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

472. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

473. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

474. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

475. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

476. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

477. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

478. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

479. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

480. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

481. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

482. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

483. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

484. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

485. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

486. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

487. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

488. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

489. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

490. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

491. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

492. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

493. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

494. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

495. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

496. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

497. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

498. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

499. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

500. /infinito/?action=edit§ion=27&x=http%3A%2F%2Fen.wikipedia.org%2Fw%2Findex.php%3Ftitle%3DTrusted_Platform_Module

Link to original content: http://en.wikipedia.org/w/index.php?title=Trusted_Platform_Module
Trusted Platform Module - Wikipedia Jump to content

Trusted Platform Module

From Wikipedia, the free encyclopedia
Trusted Platform Module
AbbreviationTPM
StatusPublished
Year started2009; 15 years ago (2009)
Latest versionISO/IEC 11889:2015
2015; 9 years ago (2015)
OrganizationTrusted Computing Group, ISO/IEC JTC 1
DomainSecure cryptoprocessor
WebsiteISO/IEC 11889-1:2015, ISO/IEC 11889-2:2015, ISO/IEC 11889-3:2015, ISO/IEC 11889-4:2015
Components of a Trusted Platform Module complying with the TPM version 1.2 standard

Trusted Platform Module (TPM) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. The term can also refer to a chip conforming to the standard ISO/IEC 11889. Common uses are to verify platform integrity (to verify that the boot process starts from a trusted combination of hardware and software), and to store disk encryption keys.

One of Windows 11's operating system requirements is TPM 2.0 implementation. Microsoft has stated that this is to help increase security against firmware attacks.[1]

The bloat of functions was criticised, especially random number generation.[2]

History

[edit]

Trusted Platform Module (TPM) was conceived by a computer industry consortium called Trusted Computing Group (TCG). It evolved into TPM Main Specification Version 1.2 which was standardized by International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) in 2009 as ISO/IEC 11889:2009.[3] TPM Main Specification Version 1.2 was finalized on 3 March 2011 completing its revision.[4][5]

On 9 April 2014 the Trusted Computing Group announced a major upgrade to their specification entitled TPM Library Specification 2.0.[6] The group continues work on the standard incorporating errata, algorithmic additions and new commands, with its most recent edition published as 2.0 in November 2019.[7] This version became ISO/IEC 11889:2015.

When a new revision is released it is divided into multiple parts by the Trusted Computing Group. Each part consists of a document that makes up the whole of the new TPM specification.

  • Part 1 Architecture (renamed from Design Principles)
  • Part 2 Structures of the TPM
  • Part 3 Commands
  • Part 4 Supporting Routines (added in TPM 2.0)

Overview

[edit]

The Trusted Platform Module (TPM) provides:

  • A hardware random number generator[8][9]
  • Facilities for the secure generation of cryptographic keys for limited uses.
  • Remote attestation: Creates a nearly unforgeable hash key summary of the hardware and software configuration. One could use the hash to verify that the hardware and software have not been changed. The software in charge of hashing the setup determines the extent of the summary.
  • Binding: Data is encrypted using the TPM bind key, a unique RSA key descended from a storage key. Computers that incorporate a TPM can create cryptographic keys and encrypt them so that they can only be decrypted by the TPM. This process, often called wrapping or binding a key, can help protect the key from disclosure. Each TPM has a master wrapping key, called the storage root key, which is stored within the TPM itself. User-level RSA key containers are stored with the Windows user profile for a particular user and can be used to encrypt and decrypt information for applications that run under that specific user identity.[10][11]
  • Sealed storage: Specifies the TPM state[12] for the data to be decrypted (unsealed).[13]
  • Other Trusted Computing functions for the data to be decrypted (unsealed).[14]

Computer programs can use a TPM for the authentication of hardware devices, since each TPM chip has a unique and secret Endorsement Key (EK) burned in as it is produced. Security embedded in hardware provides more protection than a software-only solution.[15] Its use is restricted in some countries.[16]

Uses

[edit]

Platform integrity

[edit]

The primary scope of TPM is to ensure the integrity of a platform during boot time. In this context, "integrity" means "behaves as intended", and a "platform" is any computer device regardless of its operating system. This is to ensure that the boot process starts from a trusted combination of hardware and software, and continues until the operating system has fully booted and applications are running.

When TPM is used, the firmware and the operating system are responsible for ensuring integrity.

For example, the Unified Extensible Firmware Interface (UEFI) can use TPM to form a root of trust: The TPM contains several Platform Configuration Registers (PCRs) that allow secure storage and reporting of security-relevant metrics. These metrics can be used to detect changes to previous configurations and decide how to proceed. Examples of such use can be found in Linux Unified Key Setup (LUKS),[17] BitLocker and PrivateCore vCage memory encryption. (See below.)

Another example of platform integrity via TPM is in the use of Microsoft Office 365 licensing and Outlook Exchange.[18]

Another example of TPM use for platform integrity is the Trusted Execution Technology (TXT), which creates a chain of trust. It could remotely attest that a computer is using the specified hardware and software.[19]

Disk encryption

[edit]

Full disk encryption utilities, such as dm-crypt, can use this technology to protect the keys used to encrypt the computer's storage devices and provide integrity authentication for a trusted boot pathway that includes firmware and the boot sector.[20]

Other uses and concerns

[edit]

Any application can use a TPM chip for:

Other uses exist, some of which give rise to privacy concerns. The "physical presence" feature of TPM addresses some of these concerns by requiring BIOS/UEFI-level confirmation for operations such as activating, deactivating, clearing or changing ownership of TPM by someone who is physically present at the console of the machine.[23][24]

By organizations

[edit]

The United States Department of Defense (DoD) specifies that "new computer assets (e.g., server, desktop, laptop, thin client, tablet, smartphone, personal digital assistant, mobile phone) procured to support DoD will include a TPM version 1.2 or higher where required by Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) and where such technology is available." The DoD anticipates that TPM is to be used for device identification, authentication, encryption, and device integrity verification.[25]

TPM implementations

[edit]
Trusted Platform Module installed on a mainboard
TPM 2.0 Reference Implementation
Developer(s)Microsoft
Repositorygithub.com/Microsoft/ms-tpm-20-ref
Written inC, C++
TypeTPM implementation
LicenseBSD License
Websitetrustedcomputinggroup.org/tpm-library-specification

Laptops and notebooks

[edit]

In 2006 new laptops began being sold with a built-in TPM chip. In the future, this concept could be co-located on an existing motherboard chip in computers, or any other device where the TPM facilities could be employed, such as a cellphone. On a PC, either the Low Pin Count (LPC) bus or the Serial Peripheral Interface (SPI) bus is used to connect to the TPM chip.

The Trusted Computing Group (TCG) has certified TPM chips manufactured by Infineon Technologies, Nuvoton, and STMicroelectronics,[26] having assigned TPM vendor IDs to Advanced Micro Devices, Atmel, Broadcom, IBM, Infineon, Intel, Lenovo, National Semiconductor, Nationz Technologies, Nuvoton, Qualcomm, Rockchip, Standard Microsystems Corporation, STMicroelectronics, Samsung, Sinosun, Texas Instruments, and Winbond.[27]

TPM 2.0 implementations

[edit]

There are five different types of TPM 2.0 implementations (listed in order from most to least secure):[28][29]

  • Discrete TPMs are dedicated chips that implement TPM functionality in their own tamper resistant semiconductor package. They are the most secure, certified to FIPS-140 with level 3 physical security[30] resistance to attack versus routines implemented in software, and their packages are required to implement some tamper resistance. For example, the TPM for the brake controller in a car is protected from hacking by sophisticated methods.[31]
  • Integrated TPMs are part of another chip. While they use hardware that resists software bugs, they are not required to implement tamper resistance. Intel has integrated TPMs in some of its chipsets.
  • Firmware TPMs (fTPMs) are firmware-based (e.g. UEFI) solutions that run in a CPU's trusted execution environment. Intel, AMD and Qualcomm have implemented firmware TPMs.
  • Virtual TPMs (vTPMs) are provided by and rely on hypervisors in isolated execution environments that are hidden from the software running inside virtual machines to secure their code from the software in the virtual machines. They can provide a security level comparable to a firmware TPM. Google Cloud Platform has implemented vTPM.[32]
  • Software TPMs are software emulators of TPMs that run with no more protection than a regular program gets within an operating system. They depend entirely on the environment that they run in, so they provide no more security than what can be provided by the normal execution environment. They are useful for development purposes.

Open source implementations

[edit]

The official TCG reference implementation of the TPM 2.0 Specification has been developed by Microsoft. It is licensed under BSD License and the source code is available on GitHub.[33]

In 2018 Intel open-sourced its Trusted Platform Module 2.0 (TPM2) software stack with support for Linux and Microsoft Windows.[34] The source code is hosted on GitHub and licensed under BSD License.[35][36]

Infineon funded the development of an open source TPM middleware that complies with the Software Stack (TSS) Enhanced System API (ESAPI) specification of the TCG.[37] It was developed by Fraunhofer Institute for Secure Information Technology (SIT).[38]

IBM's Software TPM 2.0 is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 and source code donated by Microsoft. It contains additional files to complete the implementation. The source code is hosted on SourceForge[39] and GitHub[40] and licensed under BSD License.

In 2022, AMD announced that under certain circumstances their fTPM implementation causes performance problems. A fix is available in form of a BIOS-Update.[41][42]

TPM 1.2 versus TPM 2.0

[edit]

While TPM 2.0 addresses many of the same use cases and has similar features, the details are different. TPM 2.0 is not backward compatible with TPM 1.2.[43][44][45]

Specification TPM 1.2 TPM 2.0
Architecture A complete specification is intended to consist of a platform-specific protection profile which references a common three part TPM 1.2 library.[5] In practice, only a PC Client protection profile was created for TPM 1.2. Protection profiles for PDA and cellular were intended to be defined,[5] but were never published. A complete specification consists of a platform-specific specification which references a common four-part TPM 2.0 library.[46][7] Platform-specific specifications define what parts of the library are mandatory, optional, or banned for that platform; and detail other requirements for that platform.[46] Platform-specific specifications include PC Client,[47] mobile,[48] and Automotive-Thin.[49]
Algorithms SHA-1 and RSA are required.[50] AES is optional.[50] Triple DES was once an optional algorithm in earlier versions of TPM 1.2,[51] but has been removed from TPM 1.2 version 103.[52] The MGF1 hash-based mask generation function that is defined in PKCS#1 is required.[50] The PC Client Platform TPM Profile (PTP) Specification requires SHA-1 and SHA-256 for hashes; RSA, ECC using the NIST P-256 curve for public-key cryptography and asymmetric digital signature generation and verification; HMAC for symmetric digital signature generation and verification; 128-bit AES for symmetric-key algorithm; and the MGF1 hash-based mask generation function that is defined in PKCS#1 are required by the TCG PC Client Platform TPM Profile (PTP) Specification.[53] Many other algorithms are also defined but are optional.[54] Note that Triple DES was added into the TPM 2.0 library, but with restrictions to reject weak keys.[55] Also, elliptic cryptography Direct Anonymous Attestation (ECDAA) using Barreto-Naehrig ECC curves which was mandatory in earlier versions has been made optional in the PC Client profile version 1.59.[53]
Crypto Primitives A random number generator, a public-key cryptographic algorithm, a cryptographic hash function, a mask generation function, digital signature generation and verification, and Direct Anonymous Attestation are required.[50] Symmetric-key algorithms and exclusive or are optional.[50] Key generation is also required.[56] A random number generator, public-key cryptographic algorithms, cryptographic hash functions, symmetric-key algorithms, digital signature generation and verification, mask generation functions, and exclusive or are required by the TCG PC Client Platform TPM Profile (PTP) Specification.[53] ECC-based Direct Anonymous Attestation using the Barreto–Naehrig 256-bit curve is optional for the TCG PC Client Platform TPM Profile (PTP) Specification.[53] The TPM 2.0 common library specification also requires key generation and key derivation functions.[57]
Hierarchy One (storage) Three (platform, storage and endorsement)
Root keys One (SRK RSA-2048) Multiple keys and algorithms per hierarchy
Authorization HMAC, PCR, locality, physical presence Password, HMAC, and policy (which covers HMAC, PCR, locality, and physical presence).
NVRAM Unstructured data Unstructured data, counter, bitmap, extend, PIN pass and fail

The TPM 2.0 policy authorization includes the 1.2 HMAC, locality, physical presence, and PCR. It adds authorization based on an asymmetric digital signature, indirection to another authorization secret, counters and time limits, NVRAM values, a particular command or command parameters, and physical presence. It permits the ANDing and ORing of these authorization primitives to construct complex authorization policies.[58]

Reception

[edit]

The Trusted Computing Group (TCG) has faced resistance to the deployment of this technology in some areas, where some authors see possible uses not specifically related to Trusted Computing, which may raise privacy concerns. The concerns include the abuse of remote validation of software decides what software is allowed to run and possible ways to follow actions taken by the user being recorded in a database, in a manner that is completely undetectable to the user.[59]

The TrueCrypt disk encryption utility, as well as its derivative VeraCrypt, do not support TPM. The original TrueCrypt developers were of the opinion that the exclusive purpose of the TPM is "to protect against attacks that require the attacker to have administrator privileges, or physical access to the computer". The attacker who has physical or administrative access to a computer can circumvent TPM, e.g., by installing a hardware keystroke logger, by resetting TPM, or by capturing memory contents and retrieving TPM-issued keys. The condemning text goes so far as to claim that TPM is entirely redundant.[60] The VeraCrypt publisher has reproduced the original allegation with no changes other than replacing "TrueCrypt" with "VeraCrypt".[61] The author is right that, after achieving either unrestricted physical access or administrative privileges, it is only a matter of time before other security measures in place are bypassed.[62][63] However, stopping an attacker in possession of administrative privileges has never been one of the goals of TPM (see § Uses for details), and TPM can stop some physical tampering.[17][19][22][23][24]

In 2015 Richard Stallman suggested to replace the term "Trusted computing" with the term "Treacherous computing" due to the danger that the computer can be made to systematically disobey its owner if the cryptographical keys are kept secret from them. He also considers that TPMs available for PCs in 2015 are not currently[timeframe?] dangerous and that there is no reason not to include one in a computer or support it in software due to failed attempts from the industry to use that technology for DRM, but that the TPM2 released in 2022 is precisely the "treacherous computing" threat he had warned of.[64]

Linux Torvalds in 2023 wrote that there is no way to believe that randomness generated by TPM is any better than randomness generated anyway by the CPU, and there is no point in supporting randomnes from a firmware source.[65]

Attacks

[edit]

In 2010 Christopher Tarnovsky presented an attack against TPMs at Black Hat Briefings, where he claimed to be able to extract secrets from a single TPM. He was able to do this after 6 months of work by inserting a probe and spying on an internal bus for the Infineon SLE 66 CL PC.[66][67]

In case of physical access, computers with TPM 1.2 are vulnerable to cold boot attacks as long as the system is on or can be booted without a passphrase from shutdown, sleep or hibernation, which is the default setup for Windows computers with BitLocker full disk encryption.[68] A fix was proposed, which has been adopted in the specifications for TPM 2.0.

In 2009, the concept of shared authorisation data in TPM 1.2 was found to be flawed. An adversary given access to the data could spoof responses from the TPM.[69] A fix was proposed, which has been adopted in the specifications for TPM 2.0.

In 2015 as part of the Snowden revelations, it was revealed that in 2010 a US CIA team claimed at an internal conference to have carried out a differential power analysis attack against TPMs that was able to extract secrets.[70][71]

Main Trusted Boot (tboot) distributions before November 2017 are affected by a dynamic root of trust for measurement (DRTM) attack CVE-2017-16837, which affects computers running on Intel's Trusted eXecution Technology (TXT) for the boot-up routine.[72]

In 2018, a design flaw in the TPM 2.0 specification for the static root of trust for measurement (SRTM) was reported (CVE-2018-6622). It allows an adversary to reset and forge platform configuration registers which are designed to securely hold measurements of software that are used for bootstrapping a computer.[73] Fixing it requires hardware-specific firmware patches.[73] An attacker abuses power interrupts and TPM state restores to trick TPM into thinking that it is running on non-tampered components.[72]

In 2021, the Dolos Group showed an attack on a discrete TPM, where the TPM chip itself had some tamper resistance, but the other endpoints of its communication bus did not. They read a full-disk-encryption key as it was transmitted across the motherboard, and used it to decrypt the laptop's SSD.[74]

2017 weak key generation controversy

[edit]

In October 2017, it was reported that a code library developed by Infineon, which had been in widespread use in its TPMs, contained a vulnerability, known as ROCA, which generated weak RSA key pairs that allowed private keys to be inferred from public keys. As a result, all systems depending upon the privacy of such weak keys are vulnerable to compromise, such as identity theft or spoofing.[75]

Cryptosystems that store encryption keys directly in the TPM without blinding could be at particular risk to these types of attacks, as passwords and other factors would be meaningless if the attacks can extract encryption secrets.[76]

Infineon has released firmware updates for its TPMs to manufacturers who have used them.[77]

Availability

[edit]

Currently, a TPM is provided by nearly all PC and notebook manufacturers in their products.

TPM

[edit]

The TPM is implemented by several vendors:

  • Infineon provides both TPM chips and TPM software, which are delivered as OEM versions with new computers as well as separately by Infineon for products with TPM technology which comply with TCG standards. For example, Infineon licensed TPM management software to Broadcom Corp. in 2004.[78]
  • Microchip (formerly Atmel) manufactured TPM devices that it claims to be compliant to the Trusted Platform Module specification version 1.2 revision 116 and offered with several interfaces (LPC, SPI, and I2C), modes (FIPS 140-2 certified and standard mode), temperature grades (commercial and industrial), and packages (TSSOP and QFN).[79][80][81] Its TPMs support PCs and embedded devices.[79] It also provides TPM development kits to support integration of its TPM devices into various embedded designs.[82]
  • Nuvoton Technology Corporation provides TPM devices for PC applications. Nuvoton also provides TPM devices for embedded systems and Internet of Things (IoT) applications via I2C and SPI host interfaces. Nuvoton's TPM complies with Common Criteria (CC) with assurance level EAL 4 augmented with ALC_FLR.1, AVA_VAN.4 and ALC_DVS.2, FIPS 140-2 level 2 with Physical Security and EMI/EMC level 3 and Trusted Computing Group Compliance requirements, all supported within a single device. TPMs produced by Winbond are now part of Nuvoton.[83]
  • STMicroelectronics has provided TPMs for PC platforms and embedded systems since 2005. The product offering [84] includes discrete devices with several interfaces supporting Serial Peripheral Interface (SPI) and I²C and different qualification grades (consumer, industrial and automotive). The TPM products are Common Criteria (CC) certified EAL4+ augmented with ALC_FLR.1 and AVA_VAN.5, FIPS 140-2 level 2 certified with physical security level 3 and also Trusted Computing Group (TCG) certified.

There are also hybrid types; for example, TPM can be integrated into an Ethernet controller, thus eliminating the need for a separate motherboard component.[85][86]

Field upgrade

[edit]

Field upgrade is the TCG term for updating the TPM firmware. The update can be between TPM 1.2 and TPM 2.0, or between firmware versions. Some vendors limit the number of transitions between 1.2 and 2.0, and some restrict rollback to previous versions.[citation needed] Platform OEMs such as HP[87] supply an upgrade tool.

Since July 28, 2016, all new Microsoft device models, lines, or series (or updating the hardware configuration of an existing model, line, or series with a major update, such as CPU, graphic cards) implement, and enable by default TPM 2.0.

While TPM 1.2 parts are discrete silicon components, which are typically soldered on the motherboard, TPM 2.0 is available as a discrete (dTPM) silicon component in a single semiconductor package, an integrated component incorporated in one or more semiconductor packages - alongside other logic units in the same package(s), and as a firmware (fTPM) based component running in a trusted execution environment (TEE) on a general purpose System-on-a-chip (SoC).[88]

Virtual TPM

[edit]
  • Google Compute Engine offers virtualized TPMs (vTPMs) as part of Google Cloud's Shielded VMs product.[89]
  • The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0). It targets the integration of TPM functionality into hypervisors, primarily into Qemu.[90]

Operating systems

[edit]
  • Windows 11 requires TPM 2.0 support as a minimum system requirement.[91][92] On many systems TPM is disabled by default which requires changing settings in the computer's UEFI to enable it.[93]
  • Windows 8 and later have native support for TPM 2.0.
  • Windows 7 can install official patch to add TPM 2.0 support.[94]
  • Windows Vista through Windows 10 have native support for TPM 1.2.
  • The Trusted Platform Module 2.0 (TPM 2.0) has been supported by the Linux kernel since version 3.20 (2012)[95][96][97]

Platforms

[edit]
  • Google includes TPMs in Chromebooks as part of their security model.[98]
  • Oracle ships TPMs in their X- and T-Series Systems such as T3 or T4 series of servers.[99] Support is included in Solaris 11.[100]
  • In 2006, with the introduction of first Macintosh models with Intel processors, Apple started to ship Macs with TPM. Apple never provided an official driver, but there was a port under GPL available.[101] Apple has not shipped a computer with TPM since 2006.[102]
  • In 2011, Taiwanese manufacturer MSI launched its Windpad 110W tablet featuring an AMD CPU and Infineon Security Platform TPM, which ships with controlling software version 3.7. The chip is disabled by default but can be enabled with the included, pre-installed software.[103]

Virtualization

[edit]
  • VMware ESXi hypervisor has supported TPM since 4.x, and from 5.0 it is enabled by default.[104][105]
  • Xen hypervisor has support of virtualized TPMs. Each guest gets its own unique, emulated, software TPM.[106]
  • KVM, combined with QEMU, has support for virtualized TPMs. As of 2012, it supports passing through the physical TPM chip to a single dedicated guest. QEMU 2.11 released in December 2017 also provides emulated TPMs to guests.[107]
  • VirtualBox has support for virtual TPM 1.2 and 2.0 devices starting with version 7.0 released in October 2022.[108]

Software

[edit]
  • Microsoft operating systems Windows Vista and later use the chip in conjunction with the included disk encryption component named BitLocker. Microsoft had announced that from January 1, 2015, all computers will have to be equipped with a TPM 2.0 module in order to pass Windows 8.1 hardware certification.[109] However, in a December 2014 review of the Windows Certification Program this was instead made an optional requirement. However, TPM 2.0 is required for connected standby systems.[110] Virtual machines running on Hyper-V can have their own virtual TPM module starting with Windows 10 1511 and Windows Server 2016.[111] Microsoft Windows includes two TPM related commands: tpmtool, a utility that can be used to retrieve information about the TPM, and tpmvscmgr, a command-line tool that allows creating and deleting TPM virtual smart cards on a computer.[112][113]

Endorsement keys

[edit]

TPM endorsement keys (EKs) are asymmetric key pairs unique to each TPM. They use the RSA and ECC algorithms. The TPM manufacturer usually provisions endorsement key certificates in TPM non-volatile memory. The certificates assert that the TPM is authentic. Starting with TPM 2.0, the certificates are in X.509 DER format.

These manufacturers typically provide their certificate authority root (and sometimes intermediate) certificates on their web sites.

TPM software libraries

[edit]

To utilize a TPM, the user needs a software library that communicates with the TPM and provides a friendlier API than the raw TPM communication. Currently, there are several such open-source TPM 2.0 libraries. Some of them also support TPM 1.2, but mostly TPM 1.2 chips are now deprecated and modern development is focused on TPM 2.0.

Typically, a TPM library provides an API with one-to-one mappings to TPM commands. The TCG specification calls this layer the System API(SAPI). This way the user has more control over the TPM operations, however the complexity is high. To hide some of the complexity most libraries also offer simpler ways to invoke complex TPM operations. The TCG specification call these two layers Enhanced System API(ESAPI) and Feature API(FAPI).

There is currently only one stack that follows the TCG specification. All the other available open-source TPM libraries use their own form of richer API.

Summary of the existing open-source TPM libraries
TPM Libraries API TPM 2.0 TPM 1.2 Attestation server or example Microsoft
Windows
Linux Bare metal
tpm2-tss[140] SAPI, ESAPI and FAPI
from the TCG specification
Yes No No, but there is a separate project[a] Yes Yes Maybe[b]
ibmtss[143][144] 1:1 mapping to TPM commands
+ rich API (mild layer on top)
Yes Partial Yes, "IBM ACS"[145][146] Yes Yes No
go-tpm[147] 1:1 mapping to TPM commands
+ rich API (mild layer on top)
Yes Partial Yes, "Go-attestation"[148] Yes Yes No
wolfTPM[149] 1:1 mapping to TPM commands
+ rich API (wrappers)
Yes No Yes, examples are inside the library Yes Yes Yes
TSS.MSR[150] 1:1 mapping to TPM commands
+ rich API (wrappers)
Yes No Yes, examples are inside the library Yes Yes[c] No
  1. ^ There is a separate project called "CHARRA" by Fraunhofer[141] that uses the tpm2-tss library for Remote Attestation. The other stacks have accompanying attestation servers or directly include examples for attestation. IBM offer their open-source Remote Attestation Server called "IBM ACS" on SourceForge and Google have "Go-Attestation" available on GitHub, while "wolfTPM" offers time and local attestation examples directly in its open-source code, also on GitHub.
  2. ^ There is an application note[142] about an example project for the AURIX 32-bit SoC using the tpm2-tss library.
  3. ^ Requires additional libraries (dotnet) to run on Linux.

These TPM libraries are sometimes also called TPM stacks, because they provide the interface for the developer or user to interact with the TPM. As seen from the table, the TPM stacks abstract the operating system and transport layer, so the user could migrate one application between platforms. For example, by using TPM stack API the user would interact the same way with a TPM, regardless if the physical chip is connected over SPI, I2C or LPC interface to the Host system.

See also

[edit]

References

[edit]
  1. ^ Warren, Tom (2021-06-25). "Why Windows 11 is forcing everyone to use TPM chips". The Verge. Retrieved 2021-11-13.
  2. ^ Neowin ·, Sayan Sen (2024-10-23). "Linus Torvalds seems frustrated with AMD Ryzen fTPM bugs and issues, suggests disabling". Neowin. Retrieved 2024-10-23.
  3. ^ "ISO/IEC 11889-1:2009 – Information technology – Trusted Platform Module – Part 1: Overview". ISO.org. International Organization for Standardization. May 2009. Archived from the original on January 28, 2017. Retrieved November 30, 2013.
  4. ^ "TPM 1.2 Main Specification". Trusted Computing Group. Retrieved 2021-11-08.
  5. ^ a b c "Trusted Platform Module (TPM) Specifications". Trusted Computing Group. March 1, 2011. Archived from the original on October 22, 2017. Retrieved October 30, 2016.
  6. ^ "Trusted Computing Group Releases TPM 2.0 Specification for Improved Platform and Device Security". Trusted Computing Group. 2014-04-01. Retrieved 2021-11-08.
  7. ^ a b "TPM Library Specification 2.0". Trusted Computing Group. Archived from the original on 29 October 2016. Retrieved October 30, 2016.
  8. ^ Alin Suciu; Tudor Carean (2010). "Benchmarking the True Random Number Generator of TPM Chips". arXiv:1008.2223 [cs.CR].
  9. ^ TPM Main Specification Level 2 (PDF), vol. Part 1 Design Principles (Version 1.2, Revision 116 ed.), archived (PDF) from the original on 24 February 2021, retrieved 12 September 2017
  10. ^ "Understanding Machine-Level and User-Level RSA Key Containers". October 22, 2014.
  11. ^ "tspi_data_bind(3) – Encrypts data blob" (Posix manual page). Trusted Computing Group. Archived from the original on November 29, 2013. Retrieved October 27, 2009.
  12. ^ Trusted Platform Module Library Specification, Family "2.0" (PDF), vol. Part 1 – Architecture, Section 12, TPM Operational States (Level 00, Revision 01.59 ed.), Trusted Computing Group, archived (PDF) from the original on January 9, 2021, retrieved January 17, 2021
  13. ^ TPM Main Specification Level 2 (PDF), vol. Part 3 – Commands (Version 1.2, Revision 116 ed.), Trusted Computing Group, archived (PDF) from the original on September 28, 2011, retrieved June 22, 2011
  14. ^ Microsoft Article on TPM, July 25, 2008, archived from the original on January 2, 2021, retrieved April 1, 2021
  15. ^ "TPM – Trusted Platform Module". IBM. Archived from the original on August 3, 2016.
  16. ^ "Windows 11 TPM 2.0 requirement has a special exception". SlashGear. 2021-06-28. Archived from the original on June 28, 2021. Retrieved 2021-06-29.
  17. ^ a b "LUKS support for storing keys in TPM NVRAM". github.com. 2013. Archived from the original on September 16, 2013. Retrieved December 19, 2013.
  18. ^ "Microsoft Office Outlook Exchange Error 80090016 After a System Board Replacement". Archived from the original on June 28, 2021. Retrieved December 23, 2020.
  19. ^ a b Greene, James (2012). "Intel Trusted Execution Technology" (PDF) (white paper). Intel. Archived (PDF) from the original on June 11, 2014. Retrieved December 18, 2013.
  20. ^ "TPM Encryption". Archived from the original on June 28, 2021. Retrieved March 29, 2021.
  21. ^ "Get Started with Virtual Smart Cards: Walkthrough Guide". Archived from the original on March 24, 2021. Retrieved December 23, 2020.
  22. ^ a b Autonomic and Trusted Computing: 4th International Conference. ATC. 2007. ISBN 9783540735465.
  23. ^ a b Pearson, Siani; Balacheff, Boris (2002). Trusted computing platforms: TCPA technology in context. Prentice Hall. ISBN 9780130092205.
  24. ^ a b "SetPhysicalPresenceRequest Method of the Win32_Tpm Class". Microsoft. Archived from the original on May 19, 2009. Retrieved June 12, 2009.
  25. ^ Instruction 8500.01. US Department of Defense. 14 March 2014. p. 43.
  26. ^ "TPM Certified Products List". Trusted Computing Group. Archived from the original on October 14, 2016. Retrieved October 1, 2016.
  27. ^ "TCG Vendor ID Registry" (PDF). 23 September 2015. Archived (PDF) from the original on 28 October 2016. Retrieved 27 October 2016.
  28. ^ Lich, Brian; Browers, Nick; Hall, Justin; McIlhargey, Bill; Farag, Hany (27 October 2017). "TPM Recommendations". Microsoft Docs. Microsoft. Archived from the original on 11 January 2018. Retrieved 10 January 2018.
  29. ^ "Trusted Platform Module 2.0: A Brief Introduction" (PDF). Trusted Computing Group. October 13, 2016. Archived (PDF) from the original on February 3, 2019. Retrieved March 31, 2018.
  30. ^ "TPM Certified Products".
  31. ^ "Trusted Platform Module (TPM) - 2.0: A BRIEF INTRODUCTION" (PDF). Retrieved 2023-08-20.
  32. ^ GCE Shielded VM - Virtual Trusted Platform Module (vTPM)
  33. ^ "GitHub - microsoft/ms-tpm-20-ref: Reference implementation of the TCG Trusted Platform Module 2.0 specification". GitHub. Archived from the original on October 27, 2020. Retrieved April 5, 2020.
  34. ^ "Intel Open-Sources New TPM2 Software Stack - Phoronix". Archived from the original on August 10, 2020. Retrieved April 5, 2020.
  35. ^ "Linux TPM2 & TSS2 Software". GitHub. Archived from the original on July 9, 2020. Retrieved April 5, 2020.
  36. ^ "The TPM2 Software Stack: Introducing a Major Open Source Release Intel Software". Archived from the original on April 9, 2020. Retrieved April 5, 2020.
  37. ^ "Open source TPM 2.0 software stack eases security adoption". August 17, 2018. Archived from the original on June 18, 2019. Retrieved April 5, 2020.
  38. ^ "Infineon Enables Open Source Software Stack for TPM 2.0". August 17, 2018. Archived from the original on February 3, 2021. Retrieved April 5, 2020.
  39. ^ "IBM's Software TPM 2.0 download | SourceForge.net". Archived from the original on June 12, 2019. Retrieved April 5, 2020.
  40. ^ "IBM SW TPM 2.0". GitHub. Archived from the original on September 18, 2020. Retrieved June 2, 2021.
  41. ^ "Intermittent System Stutter Experienced with fTPM Enabled on Windows 10 and 11". AMD. 2022-03-08. Retrieved 2022-07-02.
  42. ^ Paul Alcorn (2022-03-07). "AMD Issues Fix and Workaround for Ryzen's fTPM Stuttering Issues". Tom's Hardware. Retrieved 2022-07-02.
  43. ^ "Part 1: Architecture" (PDF), Trusted Platform Module Library, Trusted Computing Group, October 30, 2014, archived (PDF) from the original on October 28, 2016, retrieved October 27, 2016
  44. ^ "TPM 1.2 vs. 2.0 Features | Dell US".
  45. ^ "TPM 1.2, 2.0 and FTPM (Firmware-based TPM) Information". Archived from the original on February 6, 2020. Retrieved August 31, 2020.
  46. ^ a b Arthur, Will; Challener, David; Goldman, Kenneth (2015). A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security. New York City: Apress Media, LLC. p. 69. doi:10.1007/978-1-4302-6584-9. ISBN 978-1430265832. S2CID 27168869.
  47. ^ "PC Client Protection Profile for TPM 2.0 – Trusted Computing Group". trustedcomputinggroup.org. Archived from the original on October 31, 2016. Retrieved October 30, 2016.
  48. ^ "TPM 2.0 Mobile Reference Architecture Specification – Trusted Computing Group". trustedcomputinggroup.org. Archived from the original on November 1, 2016. Retrieved October 31, 2016.
  49. ^ "TCG TPM 2.0 Library Profile for Automotive-Thin". trustedcomputinggroup.org. 1 March 2015. Archived from the original on April 26, 2017. Retrieved April 25, 2017.
  50. ^ a b c d e "Archived copy" (PDF). Archived (PDF) from the original on October 30, 2016. Retrieved October 29, 2016.{{cite web}}: CS1 maint: archived copy as title (link)
  51. ^ "Archived copy" (PDF). Archived (PDF) from the original on October 30, 2016. Retrieved October 29, 2016.{{cite web}}: CS1 maint: archived copy as title (link)
  52. ^ "TPM Main Specification Level 2 Version 1.2, Revision 103: Part 1 Design Principles" (PDF). July 9, 2007. Retrieved February 16, 2024.
  53. ^ a b c d "TCG Protection Profile for PC Client Specific TPM 2.0 Library Revision 1.59; Version 1.3" (PDF). September 29, 2021. Retrieved February 16, 2024.
  54. ^ "Archived copy" (PDF). Archived (PDF) from the original on October 31, 2016. Retrieved October 30, 2016.{{cite web}}: CS1 maint: archived copy as title (link)
  55. ^ "Archived copy" (PDF). Archived (PDF) from the original on January 23, 2019. Retrieved January 23, 2019.{{cite web}}: CS1 maint: archived copy as title (link)
  56. ^ "Archived copy" (PDF). Archived (PDF) from the original on October 31, 2016. Retrieved October 30, 2016.{{cite web}}: CS1 maint: archived copy as title (link)
  57. ^ "Archived copy" (PDF). Archived (PDF) from the original on October 28, 2016. Retrieved October 27, 2016.{{cite web}}: CS1 maint: archived copy as title (link)
  58. ^ "Section 23: Enhanced Authorization (EA) Commands", Trusted Platform Module Library; Part 3: Commands (PDF), Trusted Computing Group, March 13, 2014, archived (PDF) from the original on September 3, 2014, retrieved September 2, 2014
  59. ^ Stallman, Richard Matthew. "Project GNU". Free Software Foundation. Archived from the original on 29 June 2011. Retrieved 21 July 2016.
  60. ^ "TrueCrypt User Guide" (PDF). truecrypt.org. TrueCrypt Foundation. 7 February 2012. p. 129 – via grc.com.
  61. ^ "FAQ". veracrypt.fr. IDRIX. 2 July 2017.
  62. ^ Culp, Scott (2000). "Ten Immutable Laws Of Security (Version 2.0)". TechNet Magazine. Microsoft. Archived from the original on 9 December 2015 – via Microsoft TechNet.
  63. ^ Johansson, Jesper M. (October 2008). "Security Watch Revisiting the 10 Immutable Laws of Security, Part 1". TechNet Magazine. Microsoft. Archived from the original on 10 April 2017 – via Microsoft TechNet.
  64. ^ "Can You Trust Your Computer? - GNU Project - Free Software Foundation". www.gnu.org. Retrieved 2023-09-06.
  65. ^ Neowin ·, Sayan Sen (2024-10-23). "Linus Torvalds seems frustrated with AMD Ryzen fTPM bugs and issues, suggests disabling". Neowin. Retrieved 2024-10-23.
  66. ^ "Black Hat: Researcher claims hack of processor used to secure Xbox 360, other products". January 30, 2012. Archived from the original on January 30, 2012. Retrieved August 10, 2017.{{cite web}}: CS1 maint: bot: original URL status unknown (link)
  67. ^ Szczys, Mike (February 9, 2010). "TPM crytography cracked". HACKADAY. Archived from the original on February 12, 2010.
  68. ^ Melissa Michael (8 October 2018). "Episode 14 Reinventing the Cold Boot Attack: Modern Laptop Version" (Podcast). F-Secure Blog. Archived from the original on 28 September 2019. Retrieved 28 September 2019.
  69. ^ Chen, Liqun; Ryan, Mark (2009). Attack, solution and verification for shared authorisation data in TCG TPM. Sixth International Workshop on Formal Aspects in Security and Trust (FAST'09). LNCS Springer.
  70. ^ Scahill, Jeremy ScahillJosh BegleyJeremy; Begley, Josh (March 10, 2015). "The CIA Campaign to Steal Apple's Secrets". The Intercept. Archived from the original on August 9, 2017. Retrieved August 10, 2017.
  71. ^ "TPM Vulnerabilities to Power Analysis and An Exposed Exploit to Bitlocker – The Intercept". The Intercept. Archived from the original on July 9, 2017. Retrieved August 10, 2017.
  72. ^ a b Cimpanu, Catalin (August 29, 2018). "Researchers Detail Two New Attacks on TPM Chips". Bleeping Computer. Archived from the original on 7 October 2018. Retrieved 28 September 2019.
  73. ^ a b Seunghun, Han; Wook, Shin; Jun-Hyeok, Park; HyoungChun, Kim (August 15–17, 2018). A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping (PDF). 27th USENIX Security Symposium. Baltimore, MD, USA: USENIX Association. ISBN 9781939133045. Archived (PDF) from the original on 20 August 2018.
  74. ^ "Trusted platform module security defeated in 30 minutes, no soldering required". August 3, 2021.
  75. ^ Goodin, Dan (October 16, 2017). "Millions of high-security crypto keys crippled by newly discovered flaw". Ars Technica. Archived from the original on October 19, 2018. Retrieved October 18, 2017.
  76. ^ "Can the NSA Break Microsoft's BitLocker? – Schneier on Security". www.schneier.com. Archived from the original on August 10, 2017. Retrieved August 10, 2017.
  77. ^ ""TPM Update - Infineon Technologies"". Archived from the original on February 5, 2021. Retrieved March 19, 2021.
  78. ^ "Trusted Platform Module (TPM) im LAN-Adapter". Heise Online. March 12, 2005. Archived from the original on January 7, 2019. Retrieved January 7, 2019.
  79. ^ a b "Home – Microchip Technology". www.atmel.com. Archived from the original on October 5, 2016. Retrieved October 4, 2016.
  80. ^ "AN_8965 TPM Part Number Selection Guide – Application Notes – Microchip Technology Inc" (PDF). www.atmel.com. Archived from the original (PDF) on October 5, 2016. Retrieved October 4, 2016.
  81. ^ ""Trusted Platform Module"". Microchip Technology. Retrieved 2024-02-14.
  82. ^ "Home – Microchip Technology". www.atmel.com. Archived from the original on October 5, 2016. Retrieved October 4, 2016.
  83. ^ "Nuvoton TPM".
  84. ^ "STSAFE-TPM" (PDF).
  85. ^ "Replacing Vulnerable Software with Secure Hardware: The Trusted Platform Module (TPM) and How to Use It in the Enterprise" (PDF). Trusted computing group. 2008. Archived (PDF) from the original on July 14, 2014. Retrieved June 7, 2014.
  86. ^ "NetXtreme Gigabit Ethernet Controller with Integrated TPM1.2 for Desktops". Broadcom. May 6, 2009. Archived from the original on June 14, 2014. Retrieved June 7, 2014.
  87. ^ "HP TPM Configuration Utility".
  88. ^ "TPM vs PTT: What are the main differences between these technologies?". August 9, 2021.
  89. ^ "Shielded VMs". Google Cloud. Archived from the original on April 12, 2019. Retrieved April 12, 2019.
  90. ^ "libtpms Virtual TPM". GitHub. October 27, 2021.
  91. ^ Microsoft. "Windows 11 Specs and System Requirements | Microsoft". Windows. Retrieved 2021-10-02.
  92. ^ Chabaud, Florent (November 15–16, 2022). "Setting Hardware Root-of-Trust from Edge to Cloud, and How to Use it" (PDF). In le Guernic, Gurvan (ed.). Proceedings of the 29th Computer & Electronics Security Application Rendezvous. Rennes, France: C&ESAR 2022. pp. 115–130. Location: Université de Rennes 1, Campus de Beaulieu, IRISA/Inria Rennes, 263 avenue du Général Leclerc, 35042 RENNES cedex.
  93. ^ "Windows 11 update: TPM 2.0 and PC Health Check confusion". SlashGear. 2021-06-24. Archived from the original on June 24, 2021. Retrieved 2021-06-24.
  94. ^ "Update to add support for TPM 2.0 in Windows 7 and Windows Server 2008 R2 - Microsoft Support".
  95. ^ "TPM 2.0 Support Sent In For The Linux 3.20 Kernel - Phoronix". Archived from the original on February 28, 2021. Retrieved April 5, 2020.
  96. ^ "TPM 2.0 Support Continues Maturing In Linux 4.4 - Phoronix". Archived from the original on March 5, 2021. Retrieved April 5, 2020.
  97. ^ "With Linux 4.4, TPM 2.0 Gets Into Shape For Distributions - Phoronix". Archived from the original on August 14, 2020. Retrieved April 5, 2020.
  98. ^ "Chromebook security: browsing more securely". Chrome Blog. Archived from the original on April 25, 2016. Retrieved April 7, 2013.
  99. ^ "Oracle Solaris and Oracle SPARC T4 Servers— Engineered Together for Enterprise Cloud Deployments" (PDF). Oracle. Archived (PDF) from the original on October 24, 2012. Retrieved October 12, 2012.
  100. ^ "tpmadm" (manpage). Oracle. Archived from the original on November 14, 2012. Retrieved October 12, 2012.
  101. ^ Singh, Amit, "Trusted Computing for Mac OS X", OS X book, archived from the original on July 21, 2011, retrieved August 2, 2011.
  102. ^ "Your Laptop Data Is Not Safe. So Fix It". PC World. January 20, 2009. Archived from the original on November 4, 2013. Retrieved August 22, 2013.
  103. ^ "TPM. Complete protection for peace of mind". Winpad 110W. MSI. Archived from the original on May 13, 2013. Retrieved May 20, 2013.
  104. ^ Security and the Virtualization Layer, VMware, archived from the original on November 4, 2013, retrieved May 21, 2013.
  105. ^ Enabling Intel TXT on Dell PowerEdge Servers with VMware ESXi, Dell, archived from the original on March 16, 2014, retrieved May 21, 2013.
  106. ^ "XEN Virtual Trusted Platform Module (vTPM)". Archived from the original on September 15, 2015. Retrieved September 28, 2015.
  107. ^ "QEMU 2.11 Changelog". qemu.org. December 12, 2017. Archived from the original on February 9, 2018. Retrieved February 8, 2018.
  108. ^ "Changelog for VirtualBox 7.0". virtualbox.org. October 10, 2022. Archived from the original on November 6, 2022. Retrieved November 6, 2022.
  109. ^ "Windows Hardware Certification Requirements". Microsoft. Archived from the original on June 29, 2021. Retrieved July 23, 2013.
  110. ^ "Windows Hardware Certification Requirements for Client and Server Systems". Microsoft. Archived from the original on July 1, 2015. Retrieved June 5, 2015.
  111. ^ "What's new in Hyper-V on Windows Server 2016". Microsoft. Archived from the original on March 25, 2017. Retrieved March 24, 2017.
  112. ^ tpmtool | Microsoft Docs
  113. ^ tpmvscmgr | Microsoft Docs
  114. ^ AMD EK RSA Root Certificate
  115. ^ AMD EK ECC Root Certificate
  116. ^ AMD EK Ryzen 6000 RSA Intermediate Certificate
  117. ^ AMD EK Ryzen 6000 ECC Intermediate Certificate
  118. ^ Infineon Root Certificate
  119. ^ Intel EK Root Certificate
  120. ^ Intel EK Intermediate Certificate
  121. ^ NationZ EK Root Certificate
  122. ^ NationZ EK Intermediate Certificate
  123. ^ NationZ EK Intermediate Certificate
  124. ^ NationZ EK Intermediate Certificate
  125. ^ Nuvoton EK Root Certificate 1110
  126. ^ Nuvoton EK Root Certificate 1111
  127. ^ Nuvoton EK Root Certificate 2110
  128. ^ Nuvoton EK Root Certificate 2111
  129. ^ Nuvoton EK Root Certificate 2112
  130. ^ ST Micro EK GlobalSign Certificate
  131. ^ ST Micro EK Root Certificate
  132. ^ ST Micro EK Intermediate Certificate
  133. ^ ST Micro EK Intermediate Certificate
  134. ^ ST Micro EK Intermediate Certificate
  135. ^ ST Micro EK Intermediate Certificate
  136. ^ ST Micro EK Intermediate Certificate
  137. ^ ST Micro EK GlobalSign ECC Certificate
  138. ^ ST Micro EK ECC Root Certificate
  139. ^ ST Micro EK ECC Intermediate Certificate
  140. ^ tpm2-software/tpm2-tss, Linux TPM2 & TSS2 Software, 2020-11-18, archived from the original on November 12, 2020, retrieved 2020-11-20
  141. ^ Fraunhofer-SIT/charra, Fraunhofer Institute for Secure Information Technology, 2020-08-26, archived from the original on October 29, 2020, retrieved 2020-11-20
  142. ^ AG, Infineon Technologies. "OPTIGA™ TPM SLI 9670 A-TPM board - Infineon Technologies". www.infineon.com. Archived from the original on August 6, 2020. Retrieved 2020-11-20.
  143. ^ "IBM TSS for TPM 2.0". Archived from the original on June 29, 2021. Retrieved June 2, 2021.
  144. ^ "IBM TSS for TPM 2.0". GitHub. Archived from the original on June 29, 2021. Retrieved June 2, 2021.
  145. ^ "IBM TPM Attestation Client Server". Archived from the original on March 2, 2021. Retrieved November 20, 2020.
  146. ^ "IBM TPM Attestation Client Server". GitHub. Archived from the original on June 29, 2021. Retrieved June 2, 2021.
  147. ^ google/go-tpm, 2020-11-18, archived from the original on December 14, 2020, retrieved 2020-11-20
  148. ^ google/go-attestation, 2020-11-19, archived from the original on November 19, 2020, retrieved 2020-11-20
  149. ^ wolfSSL/wolfTPM, wolfSSL, 2020-11-18, archived from the original on November 20, 2020, retrieved 2020-11-20
  150. ^ TSS.MSR, archived from the original on June 26, 2021, retrieved June 17, 2021