The document provides an overview of the trusted computing model and the trusted platform module, which aims to provide platform authentication, integrity reporting, and protected storage through a root of trust for measurement and reporting. It discusses challenges around verifying the underlying truth of attestations and whether trusted computing can meaningfully improve security, or if attackers will instead target firmware. The presentation concludes by identifying trusted computing as an interesting topic to follow and acknowledging input from a colleague that helped make the presentation possible.