· Föderation EN Di 30.01.2024 22:05:56 @tao It’s in their published threat model / security assumptions:
And later, in the spoofing section. Proper key handling is notoriously difficult. And with incentives like here, attackers would be motivated to hit it even more than some DRM system. And anyway, no need for a breakthrough if you can walk in with a gag order and do what you need. |