Talking about Cryptodevices... which one?
Dave Chapeskie
gnupg2 at ddm.wox.org
Fri Feb 6 22:59:02 CET 2015
On Fri, Feb 06, 2015 at 03:06:04PM +0100, Matthias-Christian Ott wrote:
> On 2015-02-06 09:12, Andreas Schwier wrote:
> If you use Schneier's attack tree for PGP encryption [1] as the threat
> model (for the lack of something better)
> [1] https://www.schneier.com/attacktrees.pdf
For those interested, I think better links would be to an article
Schneier wrote and the PGP figure rather than to a PDF of slides:
https://www.schneier.com/paper-attacktrees-ddj-ft.html
and https://www.schneier.com/paper-attacktrees-fig7.html
--
Dave Chapeskie
More information about the Gnupg-users
mailing list