Are any of the device cybersecurity capabilities hardware-based?

GENERAL INQUIRY

Privacy Policy

The device uses a hardware true random number
generator (TRNG) to generate a true random number as the ROOT_KEY, and then
save the ROOT_KEY in efuse.

Related post