Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: Dave Aitel (dave.aitelgmail.com)
Date: Mon Jan 05 2009 - 21:10:00 CST
So there's a way to bypass TXT and it involves an implementation error
and a design error? This list is for lions - did I miss the meat?
On Mon, Jan 5, 2009 at 11:33 AM, Joanna Rutkowska
> Hello DD,
> No longer then just a few weeks ago there was a discussion here at DD about
> Trusted Computing, TPM, TXT, etc , and even myself couldn't refrain from
> taking part in it.
> Back then I was not at liberty to disclose any details of the then-ongoing
> research on TXT security that Rafal and I was involved in. I'm happy now to add
> my 2 cents to the discussion with the following post:
> Happy New Year!
> Joanna Rutkowska
> Invisible Things Lab
>  http://lists.immunitysec.com/pipermail/dailydave/2008-November/005427.html
> Dailydave mailing list
Dailydave mailing list