realn2s ,
@realn2s@infosec.exchange avatar

@protonmail @DominickGalang @SocraticEthics

Still one question.
As far as I see even with zero-access encryption an attacker could get access to the data by deploying modified code to the clients, extracting the encryption keys. IF they have full access to the infrastructure.

Or how can this be prevented?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • MediaIndustry
  • kamenrider
  • Rutgers
  • Lexington
  • cragsand
  • mead
  • RetroGamingNetwork
  • mauerstrassenwetten
  • WarhammerFantasy
  • Teensy
  • xyz
  • PowerRangers
  • AnarchoCapitalism
  • WatchParties
  • itdept
  • supersentai
  • neondivide
  • space_engine
  • MidnightClan
  • loren
  • steinbach
  • learnviet
  • bjj
  • AgeRegression
  • electropalaeography
  • khanate
  • jeremy
  • Mordhau
  • fandic
  • All magazines