US vendors have chosen their orientation a long time ago:
"How do you protect what you want to exploit?"
- Scott Charney, VP Trustworthy Computing, Microsoft
When the TPM (Trusted Platform Module) present on all Windows PCs is purposely backdoored, how "trustworthy" this industry can claim to be?
Posted by Eric M. at October 15, 2014 10:44 AM