yeah, TPM works like that. it also has little enclaves for storing secrets and such as well to prevent malicious programs being able to access the memory where the keys are stored, usually they also have some signature capabilities as well, but probably not gonna support BIP-340 schnorr signatures

Reply to this note

Please Login to reply.

Discussion

No replies yet.