Quote Originally Posted by Svpernova09 View Post
If I'm reading that right, it relies on a database being physically secure. If that's true, doesn't it violate the old operating principle that you must always assume your data will end up in the hands of the enemy?