I think there’s an understated risk with that approach. You’re handling private key material every time you need to use the device. I appreciate the nuanced discussion. I hope people get value from this.
I think there’s an understated risk with that approach. You’re handling private key material every time you need to use the device. I appreciate the nuanced discussion. I hope people get value from this.
No replies yet.