×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

Viruses, Trojans And Worms -- Unplugged?

Arashi Re:Cell phones as trusted computing devices (88 comments)

The biggest work in the mobile market at the moment is 3G networks - which will integrate data, voice, and video over a high-speed cellular network.

Most of the implementors are explicitly not making an assumption that the terminal is a trusted device, and are relying on the USIM to carry trusted information (such as identity information), and on encrypted network storage to carry certificates etc.

Location based services do not rely on GPS, and do not rely on trusting the phone - LBS is a network function.

Digitally signing will require an authenticating protocol (e.g. USIM->PIN) and this authenticator will unlock a cert held in a crypto vault.

more than 13 years ago

Submissions

Arashi hasn't submitted any stories.

Journals

Arashi has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?