Kuehn, Ulrich wrote:
> Who is "we"? In the case of my own system I payed for (so speaking
> for myself) I would like to have such a mechanism to have the system
> prove to me before login that it is not tampered with. The TCG
> approach does not provide this. 

What does "prove" mean here? Does having a hash of the system state for
visual inspection before boot do it?

-- 
Ivan Krstić <[EMAIL PROTECTED]> | GPG: 0x147C722D

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to