3.5 Hardware authentication and attack prevention