This post is an in-depth look at the issues of hardware security and how Precursor works to mitigate them.