R. A. Hettinga writes:

 > Juarez: You have the ability to establish the notion of trusted code which
 > can't be observed or modified. Moreover, information on your machine, which
 > is living in one of those vaults or one of the sub-vaults, or as storage on
 > your disc can be encrypted with machine specific secrets so that they are
 > functionally useless if they are stolen. [For example,] if the hard drive
 > gets pulled or copied.

In other words, when the MB is fried because of some freak electrical
surge, I'm screwed, because I can't put the HD into another machine
and get the data off it?

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to