Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Or the mitigation of someone running unsigned code on your product using an embedded pi.

Stop some ways supply chain attacks can happen.

Probably some other use cases I've not considered too.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: