Closed andrewbwm closed 3 years ago
Reimplement authenticated defence on the Data asset to work analogously to how encryption works, via the Credentials asset.
authenticated
Data
Credentials
This allows the attacker to "break authentication" if they are able to compromise the credentials used for signing.
This was also requested by @jesajx in #39.
Proposed solution in #62.
Solved in #62.
Reimplement
authenticated
defence on theData
asset to work analogously to how encryption works, via theCredentials
asset.This allows the attacker to "break authentication" if they are able to compromise the credentials used for signing.
This was also requested by @jesajx in #39.