I am working on a commercial solution hopefully based on the RAK4270 module using AT commands.
How are commercial users protecting the AppKey in their end devices?
Currently, with the AT command firmware, it is fairly trivial to retrieve the LoRaWAN keys if ever an attacker gets physical access to the node (which is not impossible in the field).
How are you protecting yourselves from this?
Any help is appreciated. Thanks!