One question is about the GPS module: How much dominion do you have over this module?
I the module has a rolling encryption / (private) key generator in it and you can setup the key-pair, you can detect whether the data comes from the module you provided vs. a plagiat.
There are pretty small - I2C EEPROM protocol compatible - ICs available that may help you with this. It boils then down to the cost whether this is still a business... or becomes a useless charity.
Some obfuscation combined with collateral information may be economically more viable and may still be 'secure' enough.
Espruino is a JavaScript interpreter for low-power Microcontrollers. This site is both a support community for Espruino and a place to share what you are working on.
One question is about the GPS module: How much dominion do you have over this module?
I the module has a rolling encryption / (private) key generator in it and you can setup the key-pair, you can detect whether the data comes from the module you provided vs. a plagiat.
There are pretty small - I2C EEPROM protocol compatible - ICs available that may help you with this. It boils then down to the cost whether this is still a business... or becomes a useless charity.
Some obfuscation combined with collateral information may be economically more viable and may still be 'secure' enough.