• Valmond@lemmy.world
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    12 hours ago

    This is blatantly not true, it would be extremely simple to circumvent. How do you “tie” the cert to a specific hardware without trusting manufacturers? You just can’t, it’s like putting a padlock on a pizzabox.

    • Rossphorus@lemmy.world
      cake
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 hours ago

      As with everything, trust is required eventually. It’s more about reducing the amount of trust required than removing it entirely. It’s the same with HTTPS - website certificates only work if you trust the root certificate authorities, for example. Root manufacturer keys may only be certified if they have passed some level of trust with the root authority/authorities. Proving that trust is well-founded is more a physical issue than an algorithmic one. As it is with root CAs it may involve physical cybersecurity audits, etc.

    • Taleya@aussie.zone
      link
      fedilink
      English
      arrow-up
      2
      ·
      10 hours ago

      I literally explained earlier how this exact technology is used in digital cinema dude c’mon.

      • Valmond@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        8 hours ago

        That doesn’t mean it’s useful for forensics, IMO.

        Edit: not saying it wont be though, just that it’s not as bullet proof as you’d think, IMO.