Péter Szilágyi
Péter Szilágyi|Jun 01, 2025 08:57
Unless I'm misunderstanding the docs, seems that @Yubico's YubiHSM modules fall short at a crucial operation from being a truly auditable root of trust for a system. Specifically, you cannot prove that you didn't create a hidden copy of a private key. 🧵
+4
Mentioned
Share To

Timeline

HotFlash

APP

X

Telegram

Facebook

Reddit

CopyLink

Hot Reads