Path: ...!news.misty.com!weretis.net!feeder9.news.weretis.net!i2pn.org!i2pn2.org!.POSTED!not-for-mail From: mitchalsup@aol.com (MitchAlsup1) Newsgroups: comp.arch Subject: Re: Byte Addressability And Beyond Date: Wed, 5 Jun 2024 20:09:06 +0000 Organization: Rocksolid Light Message-ID: References: <20240603132227.00004e0f@yahoo.com> <20240605164905.000054da@yahoo.com> <20240605201553.000019d1@yahoo.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Info: i2pn2.org; logging-data="3301468"; mail-complaints-to="usenet@i2pn2.org"; posting-account="65wTazMNTleAJDh/pRqmKE7ADni/0wesT78+pyiDW8A"; User-Agent: Rocksolid Light X-Rslight-Site: $2y$10$CM3Z5c9eRKVKKGGdVQI3g.mebKkfj3ui.GUqajcfQXn28ep//V62C X-Spam-Checker-Version: SpamAssassin 4.0.0 X-Rslight-Posting-User: ac58ceb75ea22753186dae54d967fed894c3dce8 Bytes: 1913 Lines: 14 Scott Lurndal wrote: > Michael S writes: >> >>> > It's not that other, "piece-wise" encryption types can't be used, >>> > but if you are serious about privacy you should consider them >>> > insufficient. =20 >> >>And who exactly places the key into registers of your beloved shared >>encryption device? > It is pretty trivial to bake private keys into hardware at the fab, > either through e-fuses or various other mechanisms. Is that something the CIA or NSA would allow on their computers ??