Because it was technically fairly easy, given this infrastructure, the
system also allows users to generate and use their own keys, without
revealing the actual key data, on the theory that, what a user program
Because it was technically fairly easy, given this infrastructure, the
system also allows users to generate and use their own keys, without
revealing the actual key data, on the theory that, what a user program