Trusted computing: Will it work?