Hacker News new | past | comments | ask | show | jobs | submit login

No, I don't think that's true. We got used to insecure systems, and then accepted Big Brother as a security model. We can have secure devices that aren't owned by a corporation, but judging by the comments section here, nobody knows that.



How might that work? You personally have the keys to the TPM? Then some confidence trickster will tell a naive user that to make big$buck$ on the internet you'll need to handover your TPM key. And people will.


Why would you need keys to a TPM? It's meant to store keys without ever getting them out.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: