Trusted computing proponents may have found their best argument yet for incorporating specialized security hardware into every computer system.
Privacy StatementCopyright 2006, SecurityFocus