Jackson Zhou
1 min readMay 11, 2020

--

That is part of the continuous improvement plan. However, as the code is open-source, it’s hard to come up with such a protocol that improves on top of the symmetric encryption to defend programmers.

Normal people will just look at the image vs. programmers will dig into the source code where they will only be stopped by token encryption.

--

--

No responses yet