Fundamental flaw of cryptography on embedded devices: If the device encrypts, then it is likely to have a copy of the private key. And if it encrypts and might not be connected to the internet and should still operate, then it is guaranteed to have a copy of the private key.
The stuff above deals with devices that may not be internet connected at the moment they choose their keys, and thus... are vulnerable.
Fundamental flaw of cryptography on embedded devices: If the device encrypts, then it is likely to have a copy of the private key. And if it encrypts and might not be connected to the internet and should still operate, then it is guaranteed to have a copy of the private key.
The stuff above deals with devices that may not be internet connected at the moment they choose their keys, and thus... are vulnerable.