upvote
It doesn’t matter if you can produce SOCs if your hardware isn’t trusted.
reply
What if you can copy someone else's SoC including their keys?
reply
I guess read-only memory is another requirement but that is very old technology we have never had asymmetric cryptography without read only memory.
reply