From 9359a47ed37f669845d1be711f5bd5320f9ce9f4 Mon Sep 17 00:00:00 2001 From: Aaron Fortune Date: Thu, 24 Dec 2015 06:08:52 -0500 Subject: [PATCH] fixed a typo :) --- state_harmful.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/state_harmful.md b/state_harmful.md index 9d32a1c..5d8f009 100644 --- a/state_harmful.md +++ b/state_harmful.md @@ -1064,7 +1064,7 @@ On the other hand, if it was the Trusted Stick that performed the encryption, then there should be no way for the hypothetical ME rootkit to write anything onto the user partition bypassing the forced encryption with the user key. -## Temper-resistance considerations +## Tamper-resistance considerations The use of tamper-resistance technology is often thought as a beneficial means to improve physical security of an endpoint device. Care must be applied