InvestorsHub Logo
Followers 35
Posts 5775
Boards Moderated 0
Alias Born 07/22/2003

Re: aleajactaest post# 235498

Thursday, 11/28/2013 12:36:51 PM

Thursday, November 28, 2013 12:36:51 PM

Post# of 250050
If TC is to become a reality it means a transition from the current user-based model with credentials secured in hackable software to a device-based model where the device credentials are secured in hardware and multiple user credentials are then secured to each device also in hardware. Finally the keys for these credentials will be unhackable, the identities they represent no-spoofable. Finally, security and thus privacy for the user.

Everybody will benefit from a non-hackable/non-spoofable environment; consumers, enterprises, vendors and carriers.

Where will the consumer or enterprise lose the choice of what they put on their devices?

How will vendors and carriers control what consumers or enterprises put on their devices if the choice belongs to the consumer and enterprise?

Vendors and carriers and make their living by giving the consumer and the enterprise what they demand.

Supply and demand.
Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.