Wendell [ARCHIVE] on Nostr: š Original date posted:2013-07-30 š Original message:Can you explain this ...
š
Original date posted:2013-07-30
š Original message:Can you explain this process for those of us not too familiar with TPM chips?
-wendell
grabhive.com | twitter.com/grabhive | gpg: 6C0C9411
On Jul 30, 2013, at 10:40 AM, Mike Hearn wrote:
> As a testament to the seriousness with which Pond takes forward security, it can use the NVRAM in a TPM chip to reliably destroy keys for data that an SSD device might have otherwise made un-erasable.
š Original message:Can you explain this process for those of us not too familiar with TPM chips?
-wendell
grabhive.com | twitter.com/grabhive | gpg: 6C0C9411
On Jul 30, 2013, at 10:40 AM, Mike Hearn wrote:
> As a testament to the seriousness with which Pond takes forward security, it can use the NVRAM in a TPM chip to reliably destroy keys for data that an SSD device might have otherwise made un-erasable.