Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Not the only uses, but certainly all of the widespread implementations of trusted hardware just haven't been able to avoid that temptation of privileging the manufacturer while securing against the user themselves. Every little hole is another setback that keeps the designers/implementers working on this layer instead of starting to tighten the noose on the next one.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: