July 27, 2004
Happiness in Slavery
Security
Trusted Computing has legitimate security uses
Attacks which replace OS or application files will be detectable.
Next
:
Reusable proofs of work
Previous
Top
Copyright © 2004, Free Software Foundation. Verbatim copying permitted provided this notice is preserved.