- i think encryption at rest would probably just use symmeyric encryption which is unaffected by shor
- how does the attacker get into your network in this scenario. Stuff encrypted at rest by definition is not flying around the network.
- what sort of scenario would be involved where the attacker knows how to get one db but not the others? The hard part is figuring out the first db
> Drawbacks of course include “performance degradation”, “increasingly complex app”.
On the contrary, sharding is a super common performance technique.
- i think encryption at rest would probably just use symmeyric encryption which is unaffected by shor
- how does the attacker get into your network in this scenario. Stuff encrypted at rest by definition is not flying around the network.
- what sort of scenario would be involved where the attacker knows how to get one db but not the others? The hard part is figuring out the first db
> Drawbacks of course include “performance degradation”, “increasingly complex app”.
On the contrary, sharding is a super common performance technique.