Star 0

Abstract

Physical tamper-evidence and tamper-response can be applied to client devices (cellphones, tablets, laptops), particularly to protect travelers in hostile regions. We describe the technologies, deployment and lessons learned across several technologies and market segments, and how these technologies can best be used by IT and security administrators to protect their users.