brent timothy saner on 10 Feb 2018 19:30:49 -0800


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] plug Digest, Vol 159, Issue 16


On 02/10/2018 10:22 PM, Rich Freeman wrote:

> Within the PC the TPM-based solution would work by ensuring the key is
> only released when trusted software is running.  The trusted software
> wouldn't have the ability to copy the data anywhere, and the screen
> contents would be protected as well within the computer hardware.

the technology to thwart this exists longer than this itself, as you
mentioned.

https://i.imgur.com/E6Buus3.jpg


if one went through all the steps necessary to use TPM for this, keeping
it hardcopy-only and making sure it is only viewed/recalled and then
burned/otherwise satisfactorily destroyed under owner's direct
supervision is going to be *less* of a hassle.

i do not think OP is interested in hypotheticals or theory, i'm fairly
certain they were interested in practical and pragmatic application.

Attachment: signature.asc
Description: OpenPGP digital signature

___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug