brent timothy saner on 10 Feb 2018 19:30:49 -0800 |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: [PLUG] plug Digest, Vol 159, Issue 16 |
On 02/10/2018 10:22 PM, Rich Freeman wrote: > Within the PC the TPM-based solution would work by ensuring the key is > only released when trusted software is running. The trusted software > wouldn't have the ability to copy the data anywhere, and the screen > contents would be protected as well within the computer hardware. the technology to thwart this exists longer than this itself, as you mentioned. https://i.imgur.com/E6Buus3.jpg if one went through all the steps necessary to use TPM for this, keeping it hardcopy-only and making sure it is only viewed/recalled and then burned/otherwise satisfactorily destroyed under owner's direct supervision is going to be *less* of a hassle. i do not think OP is interested in hypotheticals or theory, i'm fairly certain they were interested in practical and pragmatic application.
Attachment:
signature.asc
Description: OpenPGP digital signature
___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug