@bOtM to programming • 6 months agoEncryption at Rest: Whose Threat Model Is It Anyway?scottarc.blogexternal-linkmessage-square0arrow-up11arrow-down10file-textcross-posted to: cybersecurityhackernewsnetsec
arrow-up11arrow-down1external-linkEncryption at Rest: Whose Threat Model Is It Anyway?scottarc.blog@bOtM to programming • 6 months agomessage-square0file-textcross-posted to: cybersecurityhackernewsnetsec