RWTH Aachen University
The Web has become the platform of choice for providing services to users in a range of different environments. These services can have drastically differing security requirements; for more sensitive services, it is attractive to take advantage of the wide deployment of secure hardware in the consumer space. However, the applicability of that hardware to any given security problem is not always obvious. This paper explores which use cases are appropriate, and which are not.