It’ll probably be stored in something like a TPM, whose primary purpose is to make intact extraction of the keys difficult or impossible. A few keys might become compromised but in this scenario (unlike DRM decryption) it’s easy to ignore those keys. There’s always the chance an exploit becomes available and is more widely used, though, in which case it would definitely be less valuable.
It’ll probably be stored in something like a TPM, whose primary purpose is to make intact extraction of the keys difficult or impossible. A few keys might become compromised but in this scenario (unlike DRM decryption) it’s easy to ignore those keys. There’s always the chance an exploit becomes available and is more widely used, though, in which case it would definitely be less valuable.