|
|
|
@ -80,6 +80,7 @@ removes control from users and centralizes control over keys in a single
|
|
|
|
|
system. Many such systems have been hacked, with disastrous consequences
|
|
|
|
|
for their customers.
|
|
|
|
|
|
|
|
|
|
[role="less_space pagebreak-before"]
|
|
|
|
|
Unless you are prepared to invest heavily in operational security,
|
|
|
|
|
multiple layers of access control, and audits (as the traditional banks
|
|
|
|
|
do), you should think very carefully before taking funds outside of
|
|
|
|
|