Re: Security

The underlying issue is always the need to answer the question:
What is the threat model that you're worried about?
Until there's clarity on that, all other considerations are irrelevant.

After there's clarity on that then it's a question of balancing the
tradeoffs (direct costs, user impact, unintended consequences, etc.).
One of the key "when do we know where to stop" criteria is the point
at which for any given threat vector when does it become
cheaper/easier/etc. to just go
trick/bribe/bully/break-in-and-steal/etc. the information rather than
trying to get it technologically -- i.e., the "rubber-hose" test.

Take care,
John

Reply via email to