The PERSEUS trustworthy computing is open in the sense that the design, the implementation, and the documentation are publicly available. This openness has the following advantages:
Code Evaluation: Critics of trusted computing are legitimately concerned that the limited control by the end users can principally be misused to deploy censorship, violate the privacy or restrict the rights of end-users. The openness allows end users and security experts to evaluate the design and the sourcecode to assure themselves that feared functionalities, e.g., a system-wide censorship, is not provided.
Independence: The open architecture and the open sourcecode allows necessary improvements and adaptions of the platform to individual requirements without being dependent on one manufacturer.