0 followers
It is obvious for a cryptographer, but not so obvious for our clients and users: you must assume the attacker has all of your source code. This brings us back to the good old Kerckoffs’s principle, which Labyrinth Drives is following - https://t.co/4pY2N4t