A protocol should be implemented to allow communication between subsystems and the core server to be encrypted. Encryption should be voluntary, but the core server should be able to force encryption, either with a specific subsystem, or network-wide.
A protocol should be implemented to allow communication between subsystems and the core server to be encrypted. Encryption should be voluntary, but the core server should be able to force encryption, either with a specific subsystem, or network-wide.