Hacker News
new
past
comments
ask
show
jobs
points
by
rossjudson
17 hours ago
|
comments
by
microtonal
16 hours ago
|
[-]
Remote attestation also uses asymmetric cryptography. (Device-bound private key that can sign attestation challenges, a known public key that can verify that challenge was signed with the device-bound private key.)
reply