"Ali, Saqib" <[EMAIL PROTECTED]> writes:
> How about TPM? Would this type of attack work on a tamper-resistant ver1.2 
> TPM?

The phrase is "tamper resistant", not "tamper proof". Depending on how
determined your attackers are, pretty much anything depending on
tamper resistant hardware will fall. As always, the question is
whether what you are protecting is worth more than the attackers would
have to spend on the attack.

-- 
Perry E. Metzger                [EMAIL PROTECTED]

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to