Keith
@kwm
@ForensicITGuy In addition to the above: Hardware Security Modules (HSM) are often used to protect data from simple root access. This depends on availability of the feature on the underlying device(s), but it's a good option for things that matter.
10/14/2019, 10:58:29 PM
Favs: 2
Retweets: 0
link