At 01:00 PM 10/24/2002 -0400, Trei, Peter wrote:
Level 3 requires active response to attack - zeroizing data, for example. It also requires identity checks on operators, and loading of keys either encrypted, or through a separate port.It's an interesting document, and it would be nice to have this level of security in more hardware.
Just wait... Palladium cometh ;-) steve