 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
� |
User�s
computers can interact with untrusted
|
|
|
|
computers
because of Tn�s security model
|
|
|
|
� |
Use of capabilities1 makes Tn intrinsically secure
|
|
|
|
|
unlike
Access Control List (ACL) based systems
|
|
|
|
� |
It�s
extremely easy to group together a set of computers
|
|
|
according
to a schema and specify what capabilities the
|
|
|
|
members
of that group will have
|
|
|
|
� |
By
default all external access is encrypted with 128 bit
|
|
|
|
AES
and data you deposit on remote machines is
|
|
|
|
similarly
encrypted so only you can use it
|
|