Create a container in which to keep a running computer so that it will do an action if it detects that it is being tampered, e.g., in a law enforcement raid, perhaps wipe cryptographic keys.
The container could be the size of a computer case, or the size of a room or house.
Previously, for data centers.
No comments :
Post a Comment