Hi all, a recurring discussion happening is related to the integrity of the operating system and application.
Those kind of problem could in theory be fixed with proper use of Trusted Computing support today present in nearly all computer's hardware. I noticed some very interesting area such as the Thuraya Security Kernel architecture by European Multilateral Secure Computing Base: http://www.emscb.com/content/pages/turaya.htm It does include also Trusted bootloader such as Grub: http://www.emscb.com/content/messages/52899.htm I'm wondering if, within anonymity community, the trusted computing technologies hasn't been evaluated properly for the values that it could be provide in terms of operating system and application integrity. -- Fabio Pietrosanti (naif) HERMES - Center for Transparency and Digital Human Rights http://logioshermes.org - http://globaleaks.org - http://tor2web.org -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk