Comment by aryamaan
6 years ago
How about copying them from valid machines then?
May be they generate new tokens for every request and one set of the key is in hardware itself protected.
Such a waste of tech and resources to not let use the very things which they purchased.
I agree it's a terrible waste, my suspicion is just that if they want to keep unauthorized devices off their network, it wouldn't be hard to implement.