Assuming you could easily generate unique keys for any device, can you explain the difficulty? Wouldn't it just be like the earliest device has the strongest claim to authenticity?
I didn't realize it'd be that much harder, but I've probably missed the obvious. Thanks for your time.