← Back to context Comment by grishka 3 days ago What if you can copy someone else's SoC including their keys? 1 comment grishka Reply ls612 3 days ago I guess read-only memory is another requirement but that is very old technology we have never had asymmetric cryptography without read only memory.
ls612 3 days ago I guess read-only memory is another requirement but that is very old technology we have never had asymmetric cryptography without read only memory.
I guess read-only memory is another requirement but that is very old technology we have never had asymmetric cryptography without read only memory.