You could also use encrypted and signed keys on the devices to confirm that it's the correct drive.
Was recently watching a video on the RFID tags that Bambu Labs use on their spools and not only is the tag data encrypted, it's signed so even if you bypass the encryption, you still don't have a way to spoof the signature.
If they're just files on a flash drive, what stops someone from just copying the files to another drive? Its just moving the same issue up a level in the stack, and in many ways making it easier to clone it.
One of the whole points of authenticator devices is that the actual key material isn't directly readable. You shouldn't be able to trivially reproduce the device.
If you can restrict the software, this would be a good way for controlling physical user ‚presence‘ - like in the supermarket, when a supervisor needs to scan their card for a cash register to take out a wrongly scanned item. I like it!
The fact that there is no newer bug ticket for it in 12 years shows is this a purely academic feature nobody wanted.
And why should they? Most Blu-ray players support the old format (SRT); converting it to PGS gains almost none of the upsides of the newer format (screen placement).
reply