Is that good, though? If a hole in a system is exploited by only "the top", it may be disregarded and "the top" will be able to inject anything there, but if it is exploitable by anyone from a wide group, then info from the system will be widely distrusted and communication may work around it?
Also, how to protect a chip from reverse engineering even from all except "top actors"? I remember the price for reverse engineering of certain ICs was between 5 and 7 figures of USD. Don't know about modern IC processes, but it may be affordable for many even for those?
Also, how to protect a chip from reverse engineering even from all except "top actors"? I remember the price for reverse engineering of certain ICs was between 5 and 7 figures of USD. Don't know about modern IC processes, but it may be affordable for many even for those?