Ok I\'m new to embedded system design and I was wondering even each device has a unique encryption key couldn\'t someone monitor the binary and find the encryption key? I ju