Thoughts on droplets

Ben Laurie
Tue, 02 Nov 1999 08:47:57 +0000 wrote:
> 3. A mechanism by which one machine may verify that the other's kernel is
> trusted.
> The last two problems can be solved by use of a number of hardware add-in
> cards.

It can? I'm intrigued ... how would one detect the other guy's kernel
running on an emulator that is going to do something nasty only after
the kernel verification?




"My grandfather once told me that there are two kinds of people: those
who work and those who take the credit. He told me to try to be in the
first group; there was less competition there."
     - Indira Gandhi