Articles Protecting Sensitive Data in Event-Sourced Systems with Crypto Shredding As opposed to more traditional systems where the state is persisted in a database and where CRUD operations are exposed to mutate... Read More