Spooks
Use enclaves
Run their own compilers
Buy off-the-shelf hardware
Restrict client software
Spend a lot of money testing things like openssl
The public could use this research
Previous slide
Next slide
Back to first slide
View graphic version