Slide 6 of 14
Notes:
- From June meeting: in high-security systems, you shouldn't even reveal the file exists, even if you can read the collection. Furthermore, you can even create another file with the same name; no error is reported ("we can neither confirm nor deny").