[Cryptech Tech] goals / use cases
Okubo, Tomofumi
tomokubo at verisign.com
Mon Feb 2 11:58:17 UTC 2015
Hello Peter,
The more X things it covers, the better, but I do understand it is cannot
be all of the X things due to the limited resource as you previously
mentioned.
Still, the exercise to do a preliminary risk analysis as Warren suggested
helps to figure out what X is and is not and I do see a value in it. I
believe it will be quite useful to identify what¹s on list and prioritize
it.
Cheers,
Tomofumi
On 1/30/15, 5:09 AM, "Peter Gutmann" <pgut001 at cs.auckland.ac.nz> wrote:
>"Okubo, Tomofumi" <tomokubo at verisign.com> writes:
>
>>[Can an attacker do X?]
>>
>>Yes (but can't get the keys).
>
>How do you reconcile those two? If an attacker can do all of the X
>things,
>what prevents them from getting the keys?
>
>Peter.
More information about the Tech
mailing list