"Ali, Saqib" <[EMAIL PROTECTED]> writes: > How about TPM? Would this type of attack work on a tamper-resistant ver1.2 > TPM?
The phrase is "tamper resistant", not "tamper proof". Depending on how determined your attackers are, pretty much anything depending on tamper resistant hardware will fall. As always, the question is whether what you are protecting is worth more than the attackers would have to spend on the attack. -- Perry E. Metzger [EMAIL PROTECTED] --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
