Jerry Leichter <leichter at lrw.com> writes: >Defenses are not clear. Actually I would have thought the defence was pretty trivial: Don't run your sensitive crypto on hardware controlled by an attacker. On the one hand the work they've done is pretty neat, but the overall result is a "well, duh". Peter.