Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
rainmaking
on March 19, 2015
|
parent
|
context
|
favorite
| on:
Ask HN: How would you implement a verifiable open-...
Is it known how exploit prevention is done in a remote trusted computing scenario? It is well known that TCM implementations on behalf of Microsoft are being circumvented left and right.
Consider applying for YC's Spring batch! Applications are open till Feb 11.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: