top | item 44821668 (no title) kro | 6 months ago They are in fact public/private keys and use signing a challenge for authentication. discuss order hn newest barrkel|6 months ago But in practice they usually rely on attestation by an approved vendor, and the vendor won't let you control your private key, so they'll leverage it for lock-in.
barrkel|6 months ago But in practice they usually rely on attestation by an approved vendor, and the vendor won't let you control your private key, so they'll leverage it for lock-in.
barrkel|6 months ago