We could optionally encrypt seedcat output so users running on the cloud or on a machine connected to the internet have a defense against attacks that read the disk. Attackers could still read the memory to get the output but this is a more difficult attack to engineer.
We could optionally encrypt
seedcat
output so users running on the cloud or on a machine connected to the internet have a defense against attacks that read the disk. Attackers could still read the memory to get the output but this is a more difficult attack to engineer.