1 min readMay 11, 2020
That is part of the continuous improvement plan. However, as the code is open-source, it’s hard to come up with such a protocol that improves on top of the symmetric encryption to defend programmers.
Normal people will just look at the image vs. programmers will dig into the source code where they will only be stopped by token encryption.