I'm happy to see developers looking at security as pervasive: "everything encrypted" is important since an intruder may be inside the system. Or as Shannon wrote in this paper, "assume the enemy knows the system being used." (He then writes about the importance of key selection.)
I'm happy to see developers looking at security as pervasive: "everything encrypted" is important since an intruder may be inside the system. Or as Shannon wrote in this paper, "assume the enemy knows the system being used." (He then writes about the importance of key selection.)
Warm wishes - Cliff