Hashes of content are an acceptable compromise. So you still have a URL, but the client can at least assert that the content matches the expected hash.

Reply to this note

Please Login to reply.

Discussion

No replies yet.