Highest Rated Comments


JeffJerseyCow1 karma

I am generally concerned when hardware is introduced as a "security" mechanism so here are my questions to that end.

What type of cryptographic algorithm do you use? Do you utilise a TPM for storing the encryption/decryption keys/key generation? Do you use a statically loaded key/is it identical in every device? Are you planning to go through any type of common criteria approvals process or will you rely on consumer trust?