logoalt Hacker News

gzreadtoday at 2:26 AM0 repliesview on HN

There's a second use whereby I somehow bind my own OS hash to my own data encryption key, so nobody who changes the OS can read the data. The technical distinction between this and the previous: if it's designed for the device owner's protection, the device owner can reset the system.