A. For each of the two papers:
1. Please give a 1-paragraph summary.
2. Comment on one thing you think is particularly worth noting and/or discussing.
B. Can you give an example application where Trusted Computing technology would be valuable?
C. What do you view as the main challenges for Trusted Computing technologies for security and privacy applications?