1. Describe how each of the issues in section 8.3 applies to your personal computer's hardware and software configuration.
2. Find a new product or system that manipulates transient secrets. This might be the same product or system you analyzed for
Exercise 1.8 conduct a security review of that product or system as described in section 1.12 this time focusing on issues surrounding how the system might store these secrets
Exercise 1.8
Describe how each of the issues in section 8.3 applies to your personal computer's hardware and software configuration.