1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
# Threat Model ## In Scope - malformed files - accidental corruption - oversized input - bad paths - misuse by wrappers ## Out of Scope - privileged local attacker - hostile OS - disk encryption guarantees