Z:gnu-www-ja-can-you-trust--e2f2d2-Like most hardware, treacherou/en

Like most hardware, treacherous-computing hardware can be used for purposes which are not harmful. But these features can be implemented in other ways, without treacherous-computing hardware. The principal difference that treacherous computing makes for users is the nasty consequence: rigging your computer to work against you.