Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

TPM can be secure. But secure for whom against what? Microsoft and “against you” are not implausible answers to that question…


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: