"Think about your SSL or VPN connection. Those connections are set up via a software token (key) that is exchanged between two devices (PKI).'
And that soft key can be spoofed and migrated to the intruder, correct? If so can't a TPM be of benefit? Actually I think you answered yes with your comments below:
There is absolutely no client/server hardware based device authentication (Essentially you can make that connection from any hardware that has the appropriate software installed (browser, VPN Client, etc..))
Of course it would be beneficial to be able to know for certain that the physical device making that connection is an "enterprise owned", or "enterprise aware" device. That's one major advantage to the TPM right? I can limit the domain of authorized devices in a h/w based "white list".
"Tell me. What can Scrambls do that PGP can not?"
Good question. I don't know the answer but a question might be does a TPM potentially offer secure storage for either PGP or Scrambls keys? I believe Scrambls was designed to use a TPM but it's initial free version doesn't have the capability.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.