Introduction
Threats to successful key management can be grouped into two categories: threats from malicious actors and threats that come from the inherent complexity of key storage itself that can cause user error and thus loss. The following is a non-exhaustive list of specific threats that we considered in the design of Casa systems.
Last updated