- cross-posted to:
- foss@beehaw.org
- privacyguides@lemmy.one
- cross-posted to:
- foss@beehaw.org
- privacyguides@lemmy.one
You must log in or register to comment.
Compromised hardware doesn’t know the signatures. Math.
Compromised hardware can’t create new signatures, but it doesn’t matter because it controls execution of software and can skip any checks.