6 Jul
2018
6 Jul
'18
2:43 a.m.
Perhaps that ties in with the revival of Trusted Computing - see www.lightbluetouchpaper.org/2011/09/20/trusted-computing-2-0/
Much better to counter with TPM-protected malware. http://www.cs.utexas.edu/~adunn/pubs/malware-tpm.pdf Jon _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE