Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You give the HSM the pin, it returns the key used to encrypt the data, applying the rules to that interaction with you. Emulating the HSM doesn't help since it is that phone's specific HSM with the key it knows that you need to access.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: