How we lost the trusted comping base & how to regain it. email@example.com l firstname.lastname@example.org https://tinyurl.com/thalia2012. Whoami. Agenda. The end of the Trusted Computing Base History of (secure) systems How did it come to be this way? How bad is it?
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Flash it! Plus add SMM!
Update the microcode
Reprogram the FPGA
it sucks at EVERY level!
Violence may be required to root out all possible vectors of infection!