Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



Viruses, Trojans And Worms -- Unplugged?

Arashi Re:Cell phones as trusted computing devices (88 comments)

The biggest work in the mobile market at the moment is 3G networks - which will integrate data, voice, and video over a high-speed cellular network.

Most of the implementors are explicitly not making an assumption that the terminal is a trusted device, and are relying on the USIM to carry trusted information (such as identity information), and on encrypted network storage to carry certificates etc.

Location based services do not rely on GPS, and do not rely on trusting the phone - LBS is a network function.

Digitally signing will require an authenticating protocol (e.g. USIM->PIN) and this authenticator will unlock a cert held in a crypto vault.

more than 13 years ago


Arashi hasn't submitted any stories.


Arashi has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?