[Cryptech Tech] goals / use cases

Peter Gutmann pgut001 at cs.auckland.ac.nz
Fri Jan 30 13:09:37 UTC 2015


"Okubo, Tomofumi" <tomokubo at verisign.com> writes:

>[Can an attacker do X?]
>
>Yes (but can't get the keys).

How do you reconcile those two?  If an attacker can do all of the X things,
what prevents them from getting the keys?

Peter.


More information about the Tech mailing list