On Fri, May 25, 2007 at 11:06:49 +0200, Patrick Georgi <[EMAIL PROTECTED]> wrote: > > As so often, it can be used for, and against the user. Binding certain > data to a machine (eg. certificates) and making it non-trivial to get at > them.
And the way to tell is who has the keys that are stored on the TPM chip. If it is use, then things are good. If it is someone else, then things are bad. _______________________________________________ Grub-devel mailing list Grub-devel@gnu.org http://lists.gnu.org/mailman/listinfo/grub-devel