Yes, the pointers are documented.

Would be simpler to use protected storage than obfuscation.

On Mon, 9 Dec 2024 11:03:10 -0600 Charles Mills <[email protected]> wrote:

:>Can you chase a control block chain and read all of the pairs? I am going to 
guess yes, so, a prudent programmer might put a pointer into the name/token 
pair and encrypt the data that the pointer pointed to. Not sure if encrypting 
the name buys anything, but perhaps I have not thought it through sufficiently.

--
Binyamin Dissen <[email protected]>
http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to