fre 2011-06-24 klockan 10:01 +0100 skrev Camilo Mesias: > I am still struggling to see real applications for this. I don't know > how a networked system using the technology could be differentiated > from an (insecure) software simulation of the same from a remote > viewer's perspective. Add another requirement: The remote viewer has previously had the opportunity to locally/physically inspect the device and determine what public key it has generated. /abo -- devel mailing list devel@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/devel