logoalt Hacker News

grishkayesterday at 7:16 PM1 replyview on HN

What if you can copy someone else's SoC including their keys?


Replies

ls612yesterday at 7:25 PM

I guess read-only memory is another requirement but that is very old technology we have never had asymmetric cryptography without read only memory.