A Secure End Node is an trusted, individual computer that temporarily becomes part of a trusted, well-managed network and one that mitigates risk of the End Node Problem. The primary, but typically expensive, technique is for the network owner to issue known, trusted hardware to users and then validate the remote computer and user. For example and assuming apriori access, a laptop's TPM chip can authenticate the hardware while a user's smartcard authenticates the user. Another example is the DoD Software Protection Initiative's Cross Fabric Internet Browsing System that provides browser-only, anti-tamper thin clients to users.