NotesEncryption vs. access control lists (ACLs)

Encryption vs. access control lists (ACLs) draft

Perhaps call this whole section "Access model", show how the access model works (perhaps with a schema), then compare it to ACLs.

Condensation's access model is based on encryption rather than ACLs. Instead of restricting access through a set of rules, access is restricted through encryption.

This has several advantages: