Basic batching or partitioning of data before offloading to storage would defeat this analysis, and that’s assuming you can access and query so much data regularly.
I asked for practical examples. I don’t need an in-depth report to see that this doesn’t qualify.
Most of this crypto stuff is completely impractical risk, especially compared to some phishing emails.
In security engineering we have the standard the other way around - the proponents of a design have the burden of responsibility to argue the system is secure beyond reasonable doubt, and address and elucidate any potential cracks in the security design. The subthread was about potential pitfalls even in presence of encryption.
I asked for practical examples. I don’t need an in-depth report to see that this doesn’t qualify.
Most of this crypto stuff is completely impractical risk, especially compared to some phishing emails.