How we lost the trusted comping base & how to regain it. email@example.com l firstname.lastname@example.org https://tinyurl.com/thalia2012. Whoami. Agenda. The end of the Trusted Computing Base History of (secure) systems How did it come to be this way? How bad is it?
Flash it! Plus add SMM!
Update the microcode
Reprogram the FPGA
it sucks at EVERY level!
Violence may be required to root out all possible vectors of infection!