Ideally, the reference monitor is (a) tamperproof, (b) always invoked, and (c) small enough to be subject to independent testing, the completeness of which can be assured.
en.wikipedia.org Encryption is one of the best ways to address this concern, though some packet capture appliances also feature tamperproof enclosures.
en.wikipedia.org Not only is it tamperproof, but it leaves fingerprints if you go near it and try to tamper it.
usatoday30.usatoday.com Aspects very interesting to the enterprise world are consistent and predictable execution of code and the auditability of the append-only, cryptographically tamperproof database that a blockchain is.
cointelegraph.com Since any device or system can be foiled by a person with sufficient knowledge, equipment, time, etc., the term tamperproof is a misnomer.
en.wikipedia.org