Introduction
Threats to successful key management can be grouped into two categories: threats from malicious actors and threats that come from the inherent complexity of key storage itself. The following is a non-exhaustive list of specific threats that we considered in the design of Casa systems.
Last modified 1yr ago
Copy link