M
Michael Jacobs
Guest
The ABL does not provide native asymmetric encryption. Your method appears to allow any user with the batch user's public key ( i.e. everyone) to overwrite any other user's key. It also prevents the user from recovering their own key value (because they do not have access to the batch user's private key). Perhaps I'm just missing the details.
Continue reading...
Continue reading...