Root Authority Device¶
Systems designed to be pretty secure are generally rooted in a key that is kept quite safe by comuter terms. Never touches the network, is only used for signing, certifying, and renewing keys, and is as useless for all other purposes as possible.
Most just use an old laptop that has been wiped, had a new system put on it, used to generate the key and then tossed in a safe for when its needed. When its needed for something the data is transfered to the device through physical means (usb key or something) the key is used on whatever to do whatever, and then the data is transfered back.
There’s a lot of stuff that happens in all of that which requires some decent level of knowlege of computer systems.
We hope that a specialized device can be made that can be used by general consumers to perform some few, necessary tasks. This is not going to be necessarily easy.