InvestorsHub Logo
Followers 35
Posts 5775
Boards Moderated 0
Alias Born 07/22/2003

Re: ExPatriate57 post# 236168

Friday, 02/28/2014 12:40:20 PM

Friday, February 28, 2014 12:40:20 PM

Post# of 250050
Thanks for the info.

"Think about your SSL or VPN connection. Those connections are set up via a software token (key) that is exchanged between two devices (PKI).'

And that soft key can be spoofed and migrated to the intruder, correct? If so can't a TPM be of benefit? Actually I think you answered yes with your comments below:

There is absolutely no client/server hardware based device authentication (Essentially you can make that connection from any hardware that has the appropriate software installed (browser, VPN Client, etc..))

Of course it would be beneficial to be able to know for certain that the physical device making that connection is an "enterprise owned", or "enterprise aware" device. That's one major advantage to the TPM right? I can limit the domain of authorized devices in a h/w based "white list".


"Tell me. What can Scrambls do that PGP can not?"

Good question. I don't know the answer but a question might be does a TPM potentially offer secure storage for either PGP or Scrambls keys? I believe Scrambls was designed to use a TPM but it's initial free version doesn't have the capability.

Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.