If TC is to become a reality it means a transition from the current user-based model with credentials secured in hackable software to a device-based model where the device credentials are secured in hardware and multiple user credentials are then secured to each device also in hardware. Finally the keys for these credentials will be unhackable, the identities they represent no-spoofable. Finally, security and thus privacy for the user.
Everybody will benefit from a non-hackable/non-spoofable environment; consumers, enterprises, vendors and carriers.
Where will the consumer or enterprise lose the choice of what they put on their devices?
How will vendors and carriers control what consumers or enterprises put on their devices if the choice belongs to the consumer and enterprise?
Vendors and carriers and make their living by giving the consumer and the enterprise what they demand.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.