On Fri, May 25, 2007 at 11:06:49 +0200,
  Patrick Georgi <[EMAIL PROTECTED]> wrote:
> 
> As so often, it can be used for, and against the user. Binding certain 
> data to a machine (eg. certificates) and making it non-trivial to get at 
> them.

And the way to tell is who has the keys that are stored on the TPM chip.
If it is use, then things are good. If it is someone else, then things
are bad.


_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
http://lists.gnu.org/mailman/listinfo/grub-devel

Reply via email to