The description has virtually nothing to do with the actual algorithm
proposed. Follow the link in the article - http://www.stealth-attacks.info/ -
for an actual - if informal - description.
There is no actual description publically available (there are three
completely different protocols
The best that can happen with TCPA is pretty good -
it could stop a lot of viruses and malware, for one
thing.
No, it can't. That's the point; it's not like the code running inside
the sandbox becomes magically exploitproof...it just becomes totally
opaque to any external auditor. A black
Uh, you *really* have no idea how much the black hat community is
looking forward to TCPA. For example, Office is going to have core
components running inside a protected environment totally immune to
antivirus. Since these components are going to be managing
cryptographic operations, the