usb armory，Secondary development
Our company intends to purchase usb armory. But now we have a problem. We intend to use usb armory as a trusted computing module to verify the trustworthiness of computers and certain programs. Therefore, whether usb armory supports secondary development and whether the secondary development is convenient is very important to us. Can you provide our company with a document for secondary development?