I don't know if that's possible, but let's do some drugs here and take a trip!Imagine if there was a specification in which you had a file that was indecipherable to anyone who didn't have the key. This file specifies an entire virtual machine and services. This machine provides communication with the internal part through a socket that also communicates in an encrypted way. Anyone could use this file and deploy the machine to serve this service, but only whoever had the key could use the service.

Reply to this note

Please Login to reply.

Discussion

No replies yet.