Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There are many solutions to this problem, such as cryptographic signatures.


The only solution to this problem is for your device to be tightly sealed so you can't modify the operating system nor access the CPU's private key.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: