IDT911 is the nation’s premier consultative provider of identity usb access control and data risk management, resolution and education services.
This does almost nothing to help anyone besides someone’s ego, and more likely than not they don’t even have the correct configuration…It’s just like a sound-bite, like a media one. It’s just to protect certain niche areas, which I guess is your way of surviving…on people’s ignorance. usb protect Otherwise, you can download that infected ISO from that infected website, w/ that malware that spoofs the check-sum, from your infected router, w/ infected programs to burn the CD/DVD, for your infected computer, infected keyboard, infected USB-radio mouse, infected USB flash drive.
We can write the code required to support secure boot on Linux in a minimal amount of time – in fact, most of it’s now done. But significant practical problems remain, and so far we have no workable solutions usb access control for any of them. Users can download additional protected PDF documents that they have been authorized to view to their USB devices. The keystore is automatically populated with keys accordingly.