Trusted computing comes with a warning

Thursday, 17 April 2003, 11:50 AM EST

On Wednesday, three companies that sell products and services aimed at securing corporate computers and data told attendees at the RSA Conference 2003 here that trusted computers would help businesses secure their systems. However, the praise came two days after well-known cryptographers warned an audience that trusted computing could put the keys to their information in someone else's hands.

"This key-based infrastructure leads to market dominance and lock-out and allows others to treat you computer as theirs," said Whitfield Diffie, a top encryption expert and chief security officer for Sun Microsystems. The lesson: "Hold the keys to your own computer."

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //