Proprietary design data security

Me too. More than a fair deal.

Plus, why go to GREAT lengths to execute a relatively involved supply chain attack on the design software when, instead, you can just use the gerbers and BOM your customer hands you?

Of je gebruikt de ouderwetse manier:

https://html.duckduckgo.com/html?q=PCB+deconstructing+sandwich+DEFCON+Joe+Grand

1 Like

FOSS users:
gpg works with directories as well as with files, e.g.,
gpg-zip -c -o $givendirname.gpg $givendirname
from my oft-used BASH script to backup a selected directory into an encrypted .gpg file.

This topic was automatically closed 90 days after the last reply. New replies are no longer allowed.