Device identity for IoT — anyone actually deploying secure elements at scale, or is everyone still using flash-stored keys?
Looking at the gap between "best practice" and "what people actually ship" for IoT device identity.
Best practice says: every device gets a unique private key, generated inside a secure element (ATECC608, OPTIGA Trust M, SE050, etc.), never extractable, used for mutual TLS to the cloud and for signing telemetry.
What I see in actual products (teardowns, leaked firmware, CVE reports): keys in flash, often shared across a product line, sometimes hardcoded in the binary. Even from companies that should know better.
For people who've shipped IoT products at any scale, what's the actual barrier?
- BOM cost? (608B is ~$0.60 in volume, hard to argue against)
- Provisioning complexity? (this seems like the real answer — getting unique keys into millions of devices on a contract manufacturing line is genuinely hard)
- Just nobody asking for it until after a breach?
Curious whether anyone's using the pre-provisioned variants (TrustFLEX, TrustCustom) and whether that actually solves the provisioning problem or just moves it.