Deutsch   English   Français   Italiano  
<bbdad32338c0e7b0fefd0101fbfced16@www.novabbs.org>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder9.news.weretis.net!i2pn.org!i2pn2.org!.POSTED!not-for-mail
From: mitchalsup@aol.com (MitchAlsup1)
Newsgroups: comp.arch
Subject: Re: Byte Addressability And Beyond
Date: Wed, 5 Jun 2024 17:04:49 +0000
Organization: Rocksolid Light
Message-ID: <bbdad32338c0e7b0fefd0101fbfced16@www.novabbs.org>
References: <v0s17o$2okf4$2@dont-email.me> <v327n3$1use$1@gal.iecc.com> <BM25O.40665$HBac.4762@fx15.iad> <v32lpv$1u25$1@gal.iecc.com> <v33bqg$9cst$11@dont-email.me> <v34v62$ln01$1@dont-email.me> <v36bva$10k3v$2@dont-email.me> <2024May29.090435@mips.complang.tuwien.ac.at> <v38opv$1gsj2$3@dont-email.me> <v38rkd$1ha8a$1@dont-email.me> <jwvttifrysb.fsf-monnier+comp.arch@gnu.org> <f90b6e03c727b0f209d64484ec097298@www.novabbs.org> <v3jtd8$3qduu$2@dont-email.me> <20240603132227.00004e0f@yahoo.com> <k6k7O.8602$7jpd.5620@fx47.iad> <v3klhp$3ugeh$1@dont-email.me> <v3mljt$c63k$1@dont-email.me> <v3nf7j$gesm$1@dont-email.me> <v3padn$the9$1@dont-email.me> <v3pph1$1010d$1@dont-email.me> <20240605164905.000054da@yahoo.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: i2pn2.org;
	logging-data="3286804"; mail-complaints-to="usenet@i2pn2.org";
	posting-account="65wTazMNTleAJDh/pRqmKE7ADni/0wesT78+pyiDW8A";
User-Agent: Rocksolid Light
X-Rslight-Posting-User: ac58ceb75ea22753186dae54d967fed894c3dce8
X-Rslight-Site: $2y$10$AlgfarVkpcgHezV.nAKYZu7G9mk0JzO4AUD9S4gV6n0mauN9tIK.6
X-Spam-Checker-Version: SpamAssassin 4.0.0
Bytes: 1989
Lines: 12

Michael S wrote:

> On Wed, 5 Jun 2024 13:34:25 -0000 (UTC)
> 

> The best, the most secure encryption is an end-to-end encryption.
> Which means application-to-application.

Except for the Spectré like attacks that steal the keys if they are in
memory.

> It's not that other, "piece-wise" encryption types can't be used, but
> if you are serious about privacy you should consider them insufficient.