| We hope you enjoy your visit. You're currently viewing our forum as a guest. This means you are limited to certain areas of the board and there are some features you can't use. If you join our community, you'll be able to access member-only sections, and use many member-only features such as customizing your profile, sending personal messages, and voting in polls. Registration is simple, fast, and completely free. Join our community! If you're already a member please log in to your account to access all of our features: |
| TPM Security | |
|---|---|
| Tweet Topic Started: Dec 20 2005, 10:30 AM (114 Views) | |
| Ross | Dec 20 2005, 10:30 AM Post #1 |
|
Inspire
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
http://www.msnbc.msn.com/id/10441443/ I am posting this here instead of computing and technology because I would rather it be a debate instead of just an article you read. After reading this rather interesting article post your opinions on whether you think it will help or hurt us. I will take some excerpts from the article here in case you are to lazy to read it all ![]()
|
![]() |
|
| doug05257 | Dec 20 2005, 10:27 PM Post #2 |
|
The Burger King
![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
It probably wouldn't be too hard to simulate the signature of a TPM online... It would be above my knowledge to speculate any further. Anyhow, I think that although it would help slightly, identity thieves will get around it eventually anyway - as will the file-sharers. |
![]() |
|
| 1 user reading this topic (1 Guest and 0 Anonymous) | |
| « Previous Topic · Community Chat · Next Topic » |
| Track Topic · E-mail Topic |
8:07 PM Jul 10
|



![]](http://b1.ifrm.com/0/1/0/p601690/pipright.png)




8:07 PM Jul 10