Hacker News
new
past
comments
ask
show
jobs
points
by
ls612
17 hours ago
|
comments
by
grishka
16 hours ago
|
[-]
What if you can copy someone else's SoC
including their keys
?
reply
by
ls612
16 hours ago
|
parent
|
[-]
I guess read-only memory is another requirement but that is very old technology we have never had asymmetric cryptography without read only memory.
reply