Global Feed Post Login
Replying to Avatar Max

Security is not a binary state. It is a relationship between what you protect, who you protect it from, and what resources they command.

The Marmot Protocol's threat model does what every security document should: it names specific adversaries, details how the protocol defeats each one, and admits where cryptography alone cannot save you. This matters because matching a protocol's actual defenses to your actual situation is the difference between security and security theater. nostr:naddr1qqgrsvrp8p3xxetzxvmnqdtzxejnsq3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65w0wylh7

Avatar
Flowers4Sovereignty 3w ago

💐💐💐

Reply to this note

Please Login to reply.

Discussion

No replies yet.