What is a reasonable way of storing private keys/certs on an embedded device that doesn't have trust-zone, TPM or write-once storage? Without hardware backing the key-storage the key must be stored in a boot image/persistent storage. So, what tools or strategies can be used to store that key in a manner that is resistant to peering eyes?
*Assume the goal is to make acquiring the key difficult and expensive enough to dissuade most non-state sponsored hackers.