It doesn’t matter if you can produce SOCs if your hardware isn’t trusted.
What if you can copy someone else's SoC including their keys?
What if you can copy someone else's SoC including their keys?