| ▲ | adrian_b 4 hours ago | |
Moreover, on any device that is connected to Internet you already have a unique MAC address on its Ethernet or WiFi interface. You can hash this unique MAC address, together with other data that may be shared with the other devices of the same kind, to generate unique keys or other kinds of credentials. | ||