For PC gaming news and discussion.
PCGamingWiki
Rules:
- Be Respectful.
 
- No Spam or Porn.
 
- No Advertising.
 
- No Memes.
 
- No Tech Support.
 
- No questions about buying/building computers.
 
- No game suggestions, friend requests, surveys, or begging.
 
- No Let’s Plays, streams, highlight reels/montages, random videos or shorts.
 
- No off-topic posts/comments, within reason.
 
- Use the original source, no clickbait titles, no duplicates.
(Submissions should be from the original source if possible, unless from paywalled or non-english sources.
If the title is clickbait or lacks context you may lightly edit the title.)
 
- 1 user online
 - 94 users / day
 - 369 users / week
 - 814 users / month
 - 2.86K users / 6 months
 - 1 subscriber
 - 6.52K Posts
 - 47.4K Comments
 - Modlog
 
That’s why I wrote “processor” and not CPU.
A processor that isn’t Turing complete isn’t a security problem like the TPM you referenced. A TPM includes a CPU. If a processor is Turing complete it’s called a CPU.
Is it Turing complete? I don’t know. I haven’t seen block diagrams that show the computational units have their own cpu.
CPUs also have co processer to speed up floating point operations. That doesn’t necessarily make it a security problem.