[14999] in cryptography@c2.net mail archive
Re: Difference between TCPA-Hardware and other forms of trust
daemon@ATHENA.MIT.EDU (Ben Laurie)
Mon Dec 22 18:34:42 2003
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Sat, 20 Dec 2003 20:07:25 +0000
From: Ben Laurie <ben@algroup.co.uk>
To: Bill Frantz <frantz@pwpconsult.com>
Cc: Jerrold Leichter <jerrold.leichter@smarts.com>,
cryptography@metzdowd.com
In-Reply-To: <v03110706bc09358148be@[192.168.1.5]>
Bill Frantz wrote:
> One should note that TCPA is designed to store its data (encrypted) in the
> standard file system, so standard backup and restore techniques can be
> used.
Only if your box doesn't die.
Cheers,
Ben.
--
http://www.apache-ssl.org/ben.html http://www.thebunker.net/
"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com