> I was assuming the adversary had physical access to the machine's console
> and could reboot, etc., at will, which seems to make your defense moot,
> at least for the (very few) systems I'm aware of.

Yes, if they have physical access life gets very complicated.   :'}
But most organizations I've worked with address this problem by
sending to-be-trusted employees' fingerprints to the FBI and having
trusted employees audit each other.   I think that the idea that
security can be *completely* automated is probably wrong - you always
wind up trusting *someone*.   E.g., what if the maker of your security
card has a mole on the production line who compromises your card?

                               _MelloN_

Reply via email to