Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Ease of use (if it is hard to use, it won't be used)
  2. Transparency to the user (beyond authenticating at login or boot up)
  3. Recovery from forgotten passwords (don't loose the important data) and hardware failures
  4. Effective encryption to thwart a thief from getting sensitive data off the disk
  5. Ease of setup

The project is not focussed on:

  • Protecting data from network attacks
  • Securing data communication channels for sharing the data

...