Excellent read. One example:
> Consider the case of basic public key cryptography, in which a person’s public
> and private key are created together in a single operation. These two keys are
> entangled, not with quantum physics, but with math.
>
> When I create a virtual machine server in the Amazon cloud, I am prompted for
> an RSA public key that will be used to control access to the machine.
> Typically, I create the public and private keypair on my laptop and upload the
> public key to Amazon, which bakes my public key into the server’s
> administrator account. My laptop and that remove server are thus entangled, in
> that the only way to log into the server is using the key on my laptop. And
> because that administrator account can do anything to that server—read the
> sensitivity data, hack the web server to install malware on people who visit
> its web pages, or anything else I might care to do—the private key on my
> laptop represents a security risk for that server...