Krymnos / IDP

University project
0 stars 0 forks source link

What are the boundaries for our security model? #33

Closed Krymnos closed 6 years ago

Krymnos commented 6 years ago

[] which groups of security issues can be distinguished? [] privacy [] which should we plan for within our limited time frame?