Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The initial transition from the apple root of trust to your own root (which you would then use to install new hardware) could require being authenticated, this way a thief couldn't do it while the legitimate owner could.


That's a route I hadn't thought of.

Seems like a great idea!




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: