Hardware Reference
In-Depth Information
Summarizing our threat model
Our threat model, while cursory, illustrates the thought process one should go through be-
fore using or developing security technologies. The term threat model is specific to the se-
curity industry, but it's really just proper planning. The purpose of this analysis is to find lo-
gic bugs and prevent you from spending thousands of dollars on high-tech locks for your
front door when you keep your backdoor unlocked. Now that we understand what we are
trying to protect and why it is important to use GPG, let's build the project.
Search WWH ::

Custom Search