AnonTechie writes:
"Intel's Reliance Point is a research project with a daunting task - a leak-proof Big Data sharing solution for business collaboration.
The chipmaker, says The MIT Technology Review, 'thinks it has a way to let valuable data be combined and analyzed without endangering anyone's privacy. Its researchers are testing a super-secure data locker where a company could combine its sensitive data with that from another party without either side risking that raw information being seen or stolen.' The system's inner workings are based on a series of security checks, from the BIOS on up:
When the Reliance Point system boots up, a security chip is used to check that the BIOS, the lowest-level software on a computer that starts it up, hasn't been tampered with. The BIOS then makes its own checks before activating the next level of software, which in turn makes its own checks, a chain-like process that continues until the system is fully operational.
(Score: 2) by Grishnakh on Monday March 03 2014, @07:53PM
Luckily, in the history of computing, no one has ever cracked software protected by a hardware dongle.
This is wrong. Here's a couple of links:1 50109 [subsim.com]
http://www.subsim.com/radioroom/showthread.php?t=
http://www.woodmann.com/crackz/Dongles.htm [woodmann.com]