(secure elements are all closed source, proprietary hardware)

Reply to this note

Please Login to reply.

Discussion

🍿

That’s what makes them secure against physical attack

You can verify their operations for seed generation and use them air gapped only

Nothing exclusive about a secure element there.

That would go against Kirchoff's law. If an encryption scheme's security relies on keeping anything secret except the key, the scheme isn't secure.