|
|
Subscribe / Log in / New account

In other words, DRM from top to bottom ...

In other words, DRM from top to bottom ...

Posted Nov 23, 2009 22:52 UTC (Mon) by Cyberax (✭ supporter ✭, #52523)
In reply to: In other words, DRM from top to bottom ... by gravious
Parent article: Linux Implements Support For Trusted Computing, Safer Online Transactions (The Gov Monitor)

TC systems usually allow you to reset them. That requires proof of physical presence (typically, you need to press a certain key) and destroys all existing keys on the TPM.


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds