We just need the kernel, some protected space embedded with tamper proof, hidden keys. From there we have open source, self validating software that expands capability. Multi-processor pits utilize secure element in a network as needed. It is certainly reasonable to offload all the trade book processing onto an external, and have it almost perfectly protected. Basic SE functionality means responding to enquiries from the crypto cops, as required by contract.
No comments:
Post a Comment