On Mon, Oct 25, 2021 at 11:58:14AM -0400, Stephen Frost wrote: > As for the specific encryption method to use, using CTR would be simpler > as it doesn't require access to be block-based, though we would need to > make sure to not re-use the IV across any of the temporary files being > created (potentially concurrently). Probably not that hard to do but > just something to make sure we do. Of course, if we arrange for > block-based access then we could use XTS or perhaps GCM/GCM-SIV if we > wanted to.
Agreed on all points. -- Bruce Momjian <br...@momjian.us> https://momjian.us EDB https://enterprisedb.com If only the physical world exists, free will is an illusion.