"Leichter, Jerry" <[EMAIL PROTECTED]> writes:

>All your data belong to us.  From Computerworld.
>
>Trusted Computing Group turns attention to storage

I think it's more like "There must be some business case for these things
somewhere, surely.  Let's try a breadth-first search...".

"David G. Koontz" <[EMAIL PROTECTED]> writes:

>Even conservatively there is in the tens of millions of these devices sold,
>although we have no indication how many were actually used for Trusted
>Computing purposes.

I have a friend who implemented a basic trusted-boot mechanism for a student
project, so we have evidence of at least one use of a TPM for TC, and I know
some folks at IBM Research were playing with one a few years ago, so that's at
least two users so far.  Anyone else?

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to