At 01:00 PM 10/24/2002 -0400, Trei, Peter wrote:

Level 3 requires active response to attack - zeroizing data, for
example. It also requires identity checks on operators, and
loading of keys either encrypted, or through a separate port.

It's an interesting document, and it would be nice to have this
level of security in more hardware.
Just wait... Palladium cometh ;-)

steve

Reply via email to