Talking about Cryptodevices... which one?

Dave Chapeskie gnupg2 at ddm.wox.org
Fri Feb 6 22:59:02 CET 2015


On Fri, Feb 06, 2015 at 03:06:04PM +0100, Matthias-Christian Ott wrote:
> On 2015-02-06 09:12, Andreas Schwier wrote:
> If you use Schneier's attack tree for PGP encryption [1] as the threat
> model (for the lack of something better)

> [1] https://www.schneier.com/attacktrees.pdf

For those interested, I think better links would be to an article
Schneier wrote and the PGP figure rather than to a PDF of slides:

    https://www.schneier.com/paper-attacktrees-ddj-ft.html
and https://www.schneier.com/paper-attacktrees-fig7.html

-- 
Dave Chapeskie



More information about the Gnupg-users mailing list