It's just a bad argument. The whole device security model is already built on keys all the way down to the firmware, which we trust to be safely maintained. And it's a bit crazy to argue that intelligence agencies—the originators of air-gapped networks and HSMs—can't also protect escrow keys.

Comments