Closed cameron-doyle closed 2 years ago
Each file is streamed twice from the hard drive, Once for hashing and again for encryption. Look into if hashing is required, and if it is, then try to use the same stream during the encryption process.
Hashing is considered redundant from this point forward, the future scope of the program has been limited to not do anything "smart"
Each file is streamed twice from the hard drive, Once for hashing and again for encryption. Look into if hashing is required, and if it is, then try to use the same stream during the encryption process.