# Trust no software but enforce a security policy with mechanisms that are not trustworthy ( again this is computer insecurity ).
# Trust no software but enforce a security policy with trustworthy hardware mechanisms.
0.003 seconds.
# Trust no software but enforce a security policy with mechanisms that are not trustworthy ( again this is computer insecurity ).
# Trust no software but enforce a security policy with trustworthy hardware mechanisms.
0.003 seconds.