We're looking at some kind of stream-now-post-later approach to at lest keep the cryptographic audit trail intact, have you come across anyone doing something along those lines?
I don't understand what that approach consists of. Can you share more details?
Please Login to reply.
No replies yet.