On Thu, 10 Mar 2005 22:47:16 +0100, Philip Homburg
<home.cs.vu.nl> wrote: 

I doubt that as well. If we're right, then that's the single
biggest difference between their implementation and the proposal
I worked on.

BTW, in addition to secure storage, I figured you'd want a way to
keep an attacker from impersonating the sensor. I figure by simply
protecting the connection between the sensor and the rest of the
system.

--
Ben Rosengart (212) 741-4400 x215
Sometimes it only makes sense to focus our attention on those
questions that are equal parts trivial and intriguing.
--Josh Micah Marshall