Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
Find editors who have shown interest in this subject and ask them to take a look here.
I rewrote this article to make it sound more like an encyclopedia article than a college lecture, but I left the stub tag on it since it still needs some attention from somebody who is more knowelegable about trusted computing than I am. --Transfinite 05:00, 10 June 2006 (UTC)
DNSSEC also uses a chain of trust, but I don't believe it has anything to do with trusted computing or hardware. Perhaps this article should be re-written to reflect the more general concept of a chain of trust.--184.108.40.206 (talk) 13:37, 4 November 2010 (UTC)