← @kwm Twitter archive

Keith

@kwm

@ForensicITGuy In addition to the above: Hardware Security Modules (HSM) are often used to protect data from simple root access. This depends on availability of the feature on the underlying device(s), but it's a good option for things that matter.

10/14/2019, 10:58:29 PM

Favs: 2

Retweets: 0