• andrewA
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 month ago

    It’ll probably be stored in something like a TPM, whose primary purpose is to make intact extraction of the keys difficult or impossible. A few keys might become compromised but in this scenario (unlike DRM decryption) it’s easy to ignore those keys. There’s always the chance an exploit becomes available and is more widely used, though, in which case it would definitely be less valuable.