The Taxonomy of Hardware Security Mechanisms

from blog Daniel Mangum, | ↗ original
Isolating sensitive data and operations is a fundamental issue in computing. Ideally, we want to minimize the possibility of a software defect compromising the security of a device. However, in order for the software we write to be useful, it typically needs to interact with that sensitive data in some form or fashion. So how do we interact with...