> 
> Perhaps that ties in with the revival of Trusted Computing - see 
> www.lightbluetouchpaper.org/2011/09/20/trusted-computing-2-0/
> 

Much better to counter with TPM-protected malware.

http://www.cs.utexas.edu/~adunn/pubs/malware-tpm.pdf

        Jon


_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to