Yes, the pointers are documented. Would be simpler to use protected storage than obfuscation.
On Mon, 9 Dec 2024 11:03:10 -0600 Charles Mills <[email protected]> wrote: :>Can you chase a control block chain and read all of the pairs? I am going to guess yes, so, a prudent programmer might put a pointer into the name/token pair and encrypt the data that the pointer pointed to. Not sure if encrypting the name buys anything, but perhaps I have not thought it through sufficiently. -- Binyamin Dissen <[email protected]> http://www.dissensoftware.com Director, Dissen Software, Bar & Grill - Israel ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
