Comment by ls612 3 days ago It doesn’t matter if you can produce SOCs if your hardware isn’t trusted. 2 comments ls612 Reply grishka 3 days ago What if you can copy someone else's SoC including their keys? ls612 3 days ago I guess read-only memory is another requirement but that is very old technology we have never had asymmetric cryptography without read only memory.
grishka 3 days ago What if you can copy someone else's SoC including their keys? ls612 3 days ago I guess read-only memory is another requirement but that is very old technology we have never had asymmetric cryptography without read only memory.
ls612 3 days ago I guess read-only memory is another requirement but that is very old technology we have never had asymmetric cryptography without read only memory.
What if you can copy someone else's SoC including their keys?
I guess read-only memory is another requirement but that is very old technology we have never had asymmetric cryptography without read only memory.