Bitfrost

The system keeps track of these rights, and the program is later executed in an environment which makes only the requested resources available.

The laptop's user can use the built-in security panel to grant additional rights to any application.

By acquiring a developer key from a central location, a user may even modify the background copy of the system and many aspects of the BIOS.

[3] Len Sassaman, a computer security researcher at the Catholic University of Leuven in Belgium and his colleague Meredith Patterson at the University of Iowa in Iowa City claim that the Bitfrost system has inadvertently become a possible tool for unscrupulous governments or government agencies to definitively trace the source of digital information and communications that originated on the laptops.

[4] This is a potentially serious issue as many of the countries which have the laptops have governments with questionable human rights records.