I really appreciate your reply.

I was thinking about it as the device fingerprint being essentially the seed for the key but I can see how that could be an issue if you cannot guarantee uniqueness of the seed, or if the private key is compromised (or can't be proven that it was never compromised), spoofing a device fingerprint, etc.

Anyway, I won't take more of your time but I like learning what I can. Have a good one! 👍

Reply to this note

Please Login to reply.

Discussion

No replies yet.