Hacker News
new
past
comments
ask
show
jobs
points
by
grishka
18 hours ago
|
comments
by
ls612
18 hours ago
|
[-]
It doesn’t matter if you can produce SOCs if your hardware isn’t trusted.
reply
by
grishka
17 hours ago
|
parent
|
[-]
What if you can copy someone else's SoC
including their keys
?
reply
by
ls612
17 hours ago
|
parent
|
[-]
I guess read-only memory is another requirement but that is very old technology we have never had asymmetric cryptography without read only memory.
reply