The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In this paper, we map out the contours of a trusted environment in order to establish the context for the paper. This is followed by the main components of the TC architecture with an emphasis on the Trusted Platform and the Trusted Platform Module (TPM). The next section presents a synopsis based on three threat models, viz., (i) pc owner-centric, (ii) trusted computing-centric, and (iii) digital forensics-centric and then briefly touches on the implications and unintended consequences of trusted computing for digital forensics. Finally, the last section of the concludes with a recommendation on how to mitigate the negative effects of trusted computing. Categories and Subject Descriptors K.5.0 [Legal Aspects Of Computing]: General. General Terms Security, Legal Aspects. Keywords Cybercrime, data recovery, encr...