From 92f2fcc04c20c3021b338299623c3103f2f86ea4 Mon Sep 17 00:00:00 2001 From: Rob Tsuk Date: Thu, 24 Dec 2015 09:52:57 -0800 Subject: [PATCH] Update state_harmful.md --- state_harmful.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/state_harmful.md b/state_harmful.md index 9d32a1c..5d8f009 100644 --- a/state_harmful.md +++ b/state_harmful.md @@ -1064,7 +1064,7 @@ On the other hand, if it was the Trusted Stick that performed the encryption, then there should be no way for the hypothetical ME rootkit to write anything onto the user partition bypassing the forced encryption with the user key. -## Temper-resistance considerations +## Tamper-resistance considerations The use of tamper-resistance technology is often thought as a beneficial means to improve physical security of an endpoint device. Care must be applied