R. A. Hettinga writes:
> Juarez: You have the ability to establish the notion of trusted code which > can't be observed or modified. Moreover, information on your machine, which > is living in one of those vaults or one of the sub-vaults, or as storage on > your disc can be encrypted with machine specific secrets so that they are > functionally useless if they are stolen. [For example,] if the hard drive > gets pulled or copied. In other words, when the MB is fried because of some freak electrical surge, I'm screwed, because I can't put the HD into another machine and get the data off it? --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
