| ▲ | rossjudson 13 hours ago | |
Nefariously how? | ||
| ▲ | microtonal 12 hours ago | parent [-] | |
Remote attestation also uses asymmetric cryptography. (Device-bound private key that can sign attestation challenges, a known public key that can verify that challenge was signed with the device-bound private key.) | ||