> > Perhaps that ties in with the revival of Trusted Computing - see > www.lightbluetouchpaper.org/2011/09/20/trusted-computing-2-0/ >
Much better to counter with TPM-protected malware. http://www.cs.utexas.edu/~adunn/pubs/malware-tpm.pdf Jon
_______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography