Filter
Exclude
Time range
-
Near
Cryptography is hard
Wow. I've seen many compress-then-encrypt backup schemes, which I always thought is vulnerable to CRIME but should be hard to exploit due to a stupid assumption that it should be hard to force the target to perform repeated backups.