John S. Denker [EMAIL PROTECTED] writes:
But how to trust a machine when you don't have physical
custody? Even the most-skilled members of this list
would find that a challenge (depending, as I have emphasized
before, on what your threat model is).
Note that this is not the only
bear wrote:
... I have one box with all the protection I want:
it's never connected to the net at all. I have another box
with all the protection that I consider practical for email
and web use. Both run only and exactly the software I have
put on them,
That is trusted computing