Mikuz

Members
  • Posts

    1
  • Joined

  • Last visited

Posts posted by Mikuz

  1. Maybe I just don't understand problem that you are trying to solve. But even with strict control of secrets and user management, user who got access to files could simply copy it to different share and distribute another key the way he wants. And you won't be able to control that.

    In addition to protection of information itself Sync could be good in protection of network users.

    In a very strict scenario client certificate would be associated with an IP address. Changes to this pair would need to be allowed by an administrative certificate. Other clients would only synch with allowed IP address/certificate pair.

    This would be pretty effective way to protect IP addresses of seeds and peers.