You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Once the contents of a policy get leaked (accidentally or by a targeted attack), it's much easier to bypass the policy using fake devices as one knows the set of allowed devices and their attributes. Maintaining a hash-only policy would make it much harder, because the exact values of the devices attributes cannot be retrieved from a hash value.
The text was updated successfully, but these errors were encountered:
Once the contents of a policy get leaked (accidentally or by a targeted attack), it's much easier to bypass the policy using fake devices as one knows the set of allowed devices and their attributes. Maintaining a hash-only policy would make it much harder, because the exact values of the devices attributes cannot be retrieved from a hash value.
The text was updated successfully, but these errors were encountered: