In other words, DRM from top to bottom ...
In other words, DRM from top to bottom ...
Posted Nov 23, 2009 22:52 UTC (Mon) by Cyberax (✭ supporter ✭, #52523)In reply to: In other words, DRM from top to bottom ... by gravious
Parent article: Linux Implements Support For Trusted Computing, Safer Online Transactions (The Gov Monitor)
TC systems usually allow you to reset them. That requires proof of physical presence (typically, you need to press a certain key) and destroys all existing keys on the TPM.