confidentiality and availabilityAGAINST THE THEVIES!

is useful if the threat is compromise from outside the boundaries of the machine: physical theft, remote file system, backup media, etc.intra-machine threats - an enemy who can bypass access controls can steal the key or the plaintext.not do?File type is not well-protected
predictable.Files of 5 MB or 6 MB are — on my disk — very likely to be NEFs; files under 5 MB or over 7 MB are never NEFs. Files of 1–3 MB are probably JPG; files 7 MB and larger are almost never JPG.