Distribution of sensitive data even in unprotected or untrusted digital environments

Contents