Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Software encryption is also harder to protect without a trusted boot path. My point was just that this isn't a simple binary decision but rather something which requires review and defense in depth.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: