Trusted Computing: Difference between revisions

Content deleted Content added
Timbatron (talk | contribs)
Trustworthy Computing is not the same as Trusted Computing
Line 39:
 
This would not be able to defend against a hardware based attack such as a key capture device physically between the user's keyboard and the computer.
just testing
 
=== Memory curtaining ===