logoalt Hacker News

rossjudsonyesterday at 6:48 PM1 replyview on HN

Nefariously how?


Replies

microtonalyesterday at 7:09 PM

Remote attestation also uses asymmetric cryptography. (Device-bound private key that can sign attestation challenges, a known public key that can verify that challenge was signed with the device-bound private key.)